Table of contents

  1. Front Matter
  2. Bruno Crispo, Mark Lomas
    Pages 19-32
  3. Eiichiro Fujisaki, Tatsuaki Okamoto
    Pages 33-48
  4. Ross Anderson, Charalampos Manifavas, Chris Sutherland
    Pages 49-57
  5. Torben P. Pedersen
    Pages 59-68
  6. Ronald L. Rivest, Adi Shamir
    Pages 69-87
  7. David Wheeler
    Pages 89-92
  8. Ronald Cramer, Ivan Damgård, Torben Pedersen
    Pages 101-109
  9. Mike Burmester, Yvo G. Desmedt
    Pages 119-129
  10. Chae Hoon Lim, Pil Joong Lee
    Pages 131-138
  11. L. Chen, D. Gollmann, C. J. Mitchell
    Pages 139-153
  12. Bruce Schneier, John Kelsey
    Pages 155-169
  13. Bruce Christianson, William S. Harbison
    Pages 171-176
  14. Shaw-Cheng Chuang, David Greaves
    Pages 177-196
  15. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the context of the special program on computer security, cryptology, and coding theory at the Isaac Newton Institute.
The 17 revised full papers and one abstract included in the book were carefully selected. Among the topics addressed are several types of public key cryptosystems, digital cash, electronic commerce, digital signatures, and visual cryptography. Besides original theoretical results, the collection of papers show a strong applications-oriented component.


DES Elektronische Geldbörse Elektronischer Kommerz Kryptographische Protokolle Public-Key-Kryptosysteme coding theory cryptography cryptograpic protocol cryptology digital cash digital signatures electronic commerce public key systems

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 1997
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-62494-3
  • Online ISBN 978-3-540-68047-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site