Security Protocols

9th International Workshop Cambridge, UK, April 25–27, 2001 Revised Papers

  • Bruce Christianson
  • James A. Malcolm
  • Bruno Crispo
  • Michael Roe
Conference proceedings Security Protocols 2001

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2467)

Table of contents

  1. Front Matter
    Pages I-IX
  2. Michael Roe
    Pages 4-11
  3. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis et al.
    Pages 27-39
  4. Dieter Gollmann
    Pages 80-81
  5. Dieter Gollmann
    Pages 82-86
  6. Bruce Christianson, David Wheeler
    Pages 87-90
  7. Bruce Christianson
    Pages 91-94
  8. Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryoichi Sasaki
    Pages 107-114
  9. Hiroshi Yoshiura
    Pages 115-118
  10. Giampaolo Bella, Lawrence C. Paulson
    Pages 119-125
  11. Larry Paulson
    Pages 126-133
  12. Babak Sadighi Firozabadi, Marek Sergot, Olav Bandmann
    Pages 134-145
  13. Simon N. Foley
    Pages 151-157
  14. Simon N. Foley
    Pages 158-165
  15. Mark Lomas
    Pages 166-169
  16. David Wheeler
    Pages 170-179
  17. David Wheeler
    Pages 180-187
  18. Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras
    Pages 188-201
  19. Virgil D. Gligor
    Pages 202-212
  20. Peter Drabwell
    Pages 221-228
  21. Thucydides
    Pages 239-239
  22. Back Matter
    Pages 241-241

About these proceedings


Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This year our theme was “mobile computing versus immobile security”. As usual, the insights and challenges which emerged during the workshop are re?ected in the position papers, which appear here in rewritten form. Transcripts are also included of the discussions which took place in C- bridge as the initial versions were presented. These transcripts are intended to provide a perspective on lines of argument which are worth pursuing further. Our desire is that you will join with us in this activity, and that as a result you will, like many of our participants, feel moved to propound something quite di?erent from what you originally planned. Our thanks as always to Prof. Roger Needham, FRS and to Microsoft - search Ltd. (Cambridge) for the use of the meeting room and co?ee machine. Thanks also to Lori Klimaszewska of the University of Cambridge Computing Service for transcribing the audio tapes (and for revealing in “Audrey James” a previously unsuspected double life of a well-known double agent), and to Dr. Mary Buchanan for her assistance in editing the transcripts into a Thucydidean mould. Actually, we are often asked how we go about producing the transcripts, especially upon those occasions when, for various reasons, no audio recording was made. This year we bow to pressure and reveal the details of our methodology in the Afterword.


Anonymity Authentication Bluetooth Data Security Denial of Service IPv6 Information Security Internet Internet Security Network Security Secure Networking architecture networks security trust

Editors and affiliations

  • Bruce Christianson
    • 1
  • James A. Malcolm
    • 1
  • Bruno Crispo
    • 2
  • Michael Roe
    • 3
  1. 1.Department of Computer Science Faculty of Engineering and Information SciencesUniversity of HertfordshireHatfieldUK
  2. 2.Department of Computer ScienceVrije UniversiteitHV AmsterdamThe Netherlands
  3. 3.Microsoft Research LimitedCambridgeUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-44263-9
  • Online ISBN 978-3-540-45807-4
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Finance, Business & Banking