Security Protocols

13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers

  • Editors
  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Conference proceedings Security Protocols 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4631)

Table of contents

  1. Front Matter
  2. Bruce Christianson
    Pages 1-2
  3. Tuomas Aura, Michael Roe, Anish Mohammed
    Pages 3-22
  4. Tuomas Aura
    Pages 23-30
  5. Ford-Long Wong, Frank Stajano, Jolyon Clulow
    Pages 31-45
  6. Frank Stajano
    Pages 46-50
  7. Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum
    Pages 51-59
  8. Melanie R. Rieback
    Pages 60-68
  9. Dan Cvrcek, Jan Krhovjak, Vashek Matyas
    Pages 69-75
  10. Ford-Long Wong, Frank Stajano
    Pages 112-127
  11. Ford-Long Wong
    Pages 128-132
  12. Liqun Chen, Hoon Wei Lim, Wenbo Mao
    Pages 139-156
  13. Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Austin Donnelly
    Pages 162-169
  14. Mark Lomas
    Pages 180-186
  15. Jari Arkko, Pekka Nikander, Mats Näslund
    Pages 187-196
  16. Eric Cronin, Micah Sherr, Matt Blaze
    Pages 245-249
  17. Mike Bond, George Danezis
    Pages 258-265
  18. Ben Laurie
    Pages 284-288
  19. Ben Laurie
    Pages 289-294
  20. Matthew Johnson, Frank Stajano
    Pages 295-307
  21. Matthew Johnson
    Pages 308-314
  22. Partha Das Chowdhury, Bruce Christianson, James Malcolm
    Pages 315-321
  23. Bruce Christianson
    Pages 322-328
  24. Shishir Nagaraja
    Pages 329-332
  25. John Gordon
    Pages 344-345
  26. Back Matter

About these proceedings


Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines of enquiry into interesting problems. Now we bring these proceedings to a wider audience so that you can join in. Our theme this time was “The systemlikes youandwants to be yourfriend.” Security is usually seen as making systems more di?cult for humans to use. Might there be advantages to looking at security in the context of more general design problems? Perhaps those investigating the general properties of system design and those of us in the security community have more to say to each other than we thought. Our thanks to Sidney Sussex CollegeCambridgefor the use of their facilities, and to the University of Hertfordshire for lending us several of their sta?. Particular thanks to Johanna Hunt of the University of Hertfordshire for being our impresario and organizing everything, and to Lori Klimaszewska of the University of CambridgeComputing Service for transcribing the audio tapes (in which the “crash barriers” nearly prevented collisions). The Security Protocols Workshop exists because you, the audience, part- ipate. Once you have dived into these proceedings and have had some Eleatic thoughts, we expect to hear from you.


Bridge access control anonymity authentication block/stream ciphers cryptographic protocols delegation denial of service dynamic public keys grid security information security internet security network security privacy security

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-77155-5
  • Online ISBN 978-3-540-77156-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software