Security Protocols XVII

17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers

  • Bruce Christianson
  • James A. Malcolm
  • Vashek Matyáš
  • Michael Roe
Conference proceedings Security Protocols 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7028)

Table of contents

  1. Front Matter
  2. Bruce Christianson
    Pages 1-2
  3. Jiří Kůr, Václav Matyáš, Petr Švenda
    Pages 3-17
  4. Petr Švenda
    Pages 18-23
  5. Matt Blaze, Patrick McDaniel
    Pages 24-27
  6. Matt Blaze
    Pages 28-33
  7. Matt Blaze
    Pages 34-40
  8. Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna
    Pages 41-47
  9. Xavier Chantry
    Pages 48-50
  10. Endre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider, Joe-Kai Tsay
    Pages 51-62
  11. Aybek Mukhamedov, Andrew D. Gordon, Mark Ryan
    Pages 69-81
  12. Peter Y. A. Ryan, Vanessa Teague
    Pages 111-130
  13. Peter Y. A. Ryan
    Pages 131-142
  14. Michael Backes, Matteo Maffei
    Pages 143-148
  15. Virgil D. Gligor, Adrian Perrig, Jun Zhao
    Pages 157-161

About these proceedings


This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols, SP 2009, held in Cambridge, UK, in April 2009. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Brief Encounters". In the old days, security protocols were typically run first as preliminaries to, and later to maintain, relatively stable continuing relationships between relatively unchanging individual entities. Pervasive computing, e-bay and second life have shifted the ground: we now frequently desire a secure commitment to a particular community of entities, but relatively transient relationships with individual members of it, and we are often more interested in validating attributes than identity. The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.


attack strategies authentication random keys trust management zero knowledge

Editors and affiliations

  • Bruce Christianson
    • 1
  • James A. Malcolm
    • 1
  • Vashek Matyáš
    • 2
  • Michael Roe
    • 1
  1. 1.Computer Science DepartmentUniversity of HertfordshireUK
  2. 2.Faculty of InformaticsMasaryk UniversityBrnoCzech Republic

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-36212-5
  • Online ISBN 978-3-642-36213-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Consumer Packaged Goods