Security Protocols XVII

17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers

  • Bruce Christianson
  • James A. Malcolm
  • Vashek Matyáš
  • Michael Roe
Conference proceedings Security Protocols 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7028)

Table of contents

  1. Front Matter
  2. Bruce Christianson
    Pages 1-2
  3. Jiří Kůr, Václav Matyáš, Petr Švenda
    Pages 3-17
  4. Petr Švenda
    Pages 18-23
  5. Matt Blaze, Patrick McDaniel
    Pages 24-27
  6. Matt Blaze
    Pages 28-33
  7. Matt Blaze
    Pages 34-40
  8. Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna
    Pages 41-47
  9. Xavier Chantry
    Pages 48-50
  10. Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
    Pages 51-62
  11. Aybek Mukhamedov, Andrew D. Gordon, Mark Ryan
    Pages 69-81
  12. Peter Y. A. Ryan, Vanessa Teague
    Pages 111-130
  13. Peter Y. A. Ryan
    Pages 131-142
  14. Michael Backes, Matteo Maffei
    Pages 143-148
  15. Virgil D. Gligor, Adrian Perrig, Jun Zhao
    Pages 157-161
  16. Virgil D. Gligor
    Pages 162-170
  17. Stephen Clarke, Bruce Christianson, Hannan Xiao
    Pages 171-178
  18. Joseph Bonneau
    Pages 189-198
  19. Joseph Bonneau
    Pages 199-212
  20. Paul Syverson
    Pages 213-230
  21. Paul Syverson
    Pages 231-239
  22. Dusko Pavlovic, Catherine Meadows
    Pages 240-261
  23. Chris J. Mitchell
    Pages 269-274
  24. Chris J. Mitchell
    Pages 275-281
  25. Ross Anderson
    Pages 282-284
  26. Ross Anderson
    Pages 285-297
  27. Simon N. Foley, Vivien M. Rooney
    Pages 298-307
  28. Simon N. Foley
    Pages 308-320
  29. Sören Preibusch, Alastair R. Beresford
    Pages 321-334
  30. Jonathan Anderson, Frank Stajano
    Pages 343-349
  31. Jonathan Anderson
    Pages 350-364
  32. Orson Scott Card
    Pages 365-365
  33. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols, SP 2009, held in Cambridge, UK, in April 2009. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Brief Encounters". In the old days, security protocols were typically run first as preliminaries to, and later to maintain, relatively stable continuing relationships between relatively unchanging individual entities. Pervasive computing, e-bay and second life have shifted the ground: we now frequently desire a secure commitment to a particular community of entities, but relatively transient relationships with individual members of it, and we are often more interested in validating attributes than identity. The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.


attack strategies authentication random keys trust management zero knowledge

Editors and affiliations

  • Bruce Christianson
    • 1
  • James A. Malcolm
    • 1
  • Vashek Matyáš
    • 2
  • Michael Roe
    • 1
  1. 1.Computer Science DepartmentUniversity of HertfordshireUK
  2. 2.Faculty of InformaticsMasaryk UniversityBrnoCzech Republic

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-36212-5
  • Online ISBN 978-3-642-36213-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software