Skip to main content
  • Conference proceedings
  • © 2000

Security Protocols

7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1796)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Performance of Protocols

    • Michael Roe
    Pages 140-146
  2. Performance of Protocols

    • Michael Roe
    Pages 147-152
  3. Integrity-Aware PCBC Encryption Schemes

    • Virgil D. Gligor, Pompiliu Donescu
    Pages 153-168
  4. Integrity-Aware PCBC Encryption Schemes

    • Virgil Gligor
    Pages 169-171
  5. The Resurrecting Duckling

    • Frank Stajano
    Pages 183-194
  6. INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds

    • Hiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryoichi Sasaki et al.
    Pages 195-202
  7. INTERNET-MARKs

    • Ryoichi Sasaki
    Pages 203-207
  8. Pictures Can’t Lie under Oath

    • Bruce Christianson, James A. Malcolm, Brian Robinson
    Pages 208-211
  9. Pictures Can’t Lie under Oath

    • James A. Malcolm
    Pages 212-218
  10. Bob versus Bob – Good Guy/Bad Guy

    • Bob Morris
    Pages 219-223
  11. Back Matter

About this book

Another year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly, this year we discoveredsome radically new things beginning to happen. The reasons in retrospect are not far to seek: advances in technology, changes in the system context, and new types of consumer devices and applications have combined to expose new security requirements. This has led not only to new protocols and models, but also to known protocols being deployedindelicate newways,withpreviousfragilitiesofwatermarkingand- tual authentication, for example, becoming desirable features. At the workshop we identi?ed several of these developments and began to map out some lines of enquiry. This volume brings you a selection of deliberately disputatious position - pers, followed by not-quite-verbatim transcripts of the discussions which they provoked. As always, our purpose in making these proceedings available to you is the hope that they will move your thinking in an unexpected direction. If you ?nd your attention caught by something here, if it makes you pause to re?ect, or to think “why, that is justso wrong”,then good. We’re waiting for your mail.

Editors and Affiliations

  • Computer Science Department, University of Hertfordshire,  

    Bruce Christianson

  • Computer Systems Group, Vrije Universiteit, Amsterdam, The Netherlands

    Bruno Crispo

  • Georgia Institute of Technology, Atlanta

    James A. Malcolm

  • Microsoft Research, Cambridge, UK

    Michael Roe

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access