Security Protocols

10th International Workshop, Cambridge, UK, April 17-19, 2002. Revised Papers

  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Conference proceedings Security Protocols 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2845)

Table of contents

  1. Front Matter
  2. Bruce Christianson
    Pages 1-1
  3. Roger Needham
    Pages 2-4
  4. Chris J. Mitchell, Paulo S. Pagliusi
    Pages 20-33
  5. Laurent Eschenauer, Virgil D. Gligor, John Baras
    Pages 47-66
  6. Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryoichi Sasaki
    Pages 67-73
  7. Babak Sadighi Firozabadi, Marek Sergot
    Pages 96-103
  8. Giampaolo Bella, Stefano Bistarelli
    Pages 104-119
  9. Giampaolo Bella, Lawrence C. Paulson
    Pages 120-127
  10. Ryoichi Sasaki, Hiroshi Yoshiura, Shinji Itoh
    Pages 128-144
  11. Raphael Yahalom
    Pages 145-157
  12. Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy et al.
    Pages 158-178
  13. Simon N. Foley
    Pages 179-188
  14. Alec Yasinsac, James A. Davis
    Pages 189-202
  15. Pekka Nikander, Jari Arkko
    Pages 203-214
  16. Tuomas Aura
    Pages 215-234
  17. Bruce Christianson
    Pages 235-241
  18. No Firstname given No Lastname given
    Pages 242-242
  19. Back Matter

About these proceedings


Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was “Discerning the Protocol Participants.” Security protocols are usually described in terms of the active participants – Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add? Do let us know.


Bridge IPv6 Internet security access control authentication communication cryptographic protocols information security mobile security network security privacy protocol attacks secure communications security security protocols

Editors and affiliations

  • Bruce Christianson
    • 1
  • Bruno Crispo
    • 2
  • James A. Malcolm
    • 3
  • Michael Roe
    • 4
  1. 1.Computer Science DepartmentUniversity of Hertfordshire 
  2. 2.Computer Systems GroupVrije UniversiteitAmsterdamThe Netherlands
  3. 3.Georgia Institute of TechnologyAtlanta
  4. 4.Microsoft ResearchCambridgeUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20830-3
  • Online ISBN 978-3-540-39871-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software