Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (Eds.):
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers.
Lecture Notes in Computer Science 2467 Springer 2002, ISBN 3-540-44263-4 BibTeX
@proceedings{DBLP:conf/spw/2001,
editor = {Bruce Christianson and
Bruno Crispo and
James A. Malcolm and
Michael Roe},
title = {Security Protocols, 9th International Workshop, Cambridge, UK,
April 25-27, 2001, Revised Papers},
booktitle = {Security Protocols Workshop},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2467},
year = {2002},
isbn = {3-540-44263-4},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Roger M. Needham:
Keynote Address: Mobile Computing versus Immobile Security.
1-3
Electronic Edition (Springer LINK) BibTeX
- Michael Roe:
Experiences of Mobile IP Security.
4-11
Electronic Edition (Springer LINK) BibTeX
- Pekka Nikander:
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World.
12-21
Electronic Edition (Springer LINK) BibTeX
- Pekka Nikander:
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion).
22-26
Electronic Edition (Springer LINK) BibTeX
- William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols.
27-39
Electronic Edition (Springer LINK) BibTeX
- Matt Blaze:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion).
40-48
Electronic Edition (Springer LINK) BibTeX
- Geraint Price:
Thwarting Timing Attacks Using ATM Networks.
49-58
Electronic Edition (Springer LINK) BibTeX
- Geraint Price:
Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion).
59-62
Electronic Edition (Springer LINK) BibTeX
- Tuomas Aura, Silja Mäki:
Towards a Survivable Security Architecture for Ad-Hoc Networks.
63-73
Electronic Edition (Springer LINK) BibTeX
- Silja Mäki:
Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion).
74-79
Electronic Edition (Springer LINK) BibTeX
- Dieter Gollmann:
PIM Security.
80-81
Electronic Edition (Springer LINK) BibTeX
- Dieter Gollmann:
PIM Security (Transcript of Discussion).
82-86
Electronic Edition (Springer LINK) BibTeX
- Bruce Christianson, David Wheeler:
Merkle Puzzles Revisited - Finding Matching Elements Between Lists.
87-90
Electronic Edition (Springer LINK) BibTeX
- Bruce Christianson:
Merkle Puzzles Revisited (Transcript of Discussion).
91-94
Electronic Edition (Springer LINK) BibTeX
- Jan Jürjens:
Encapsulating Rules of Prudent Security Engineering.
95-101
Electronic Edition (Springer LINK) BibTeX
- Jan Jürjens:
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion).
102-106
Electronic Edition (Springer LINK) BibTeX
- Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki:
A Multi-OS Approach to Trusted Computer Systems.
107-114
Electronic Edition (Springer LINK) BibTeX
- Hiroshi Yoshiura:
A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion).
115-118
Electronic Edition (Springer LINK) BibTeX
- Giampaolo Bella, Lawrence C. Paulson:
A Proof of Non-repudiation.
119-125
Electronic Edition (Springer LINK) BibTeX
- Lawrence C. Paulson:
A Proof of Non-repudiation (Transcript of Discussion).
126-133
Electronic Edition (Springer LINK) BibTeX
- Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann:
Using Authority Certificates to Create Management Structures.
134-145
Electronic Edition (Springer LINK) BibTeX
- Babak Sadighi Firozabadi:
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion).
146-150
Electronic Edition (Springer LINK) BibTeX
- Simon N. Foley:
Trust Management and Whether to Delegate.
151-157
Electronic Edition (Springer LINK) BibTeX
- Simon N. Foley:
Trust Management and Whether to Delegate (Transcript of Discussion).
158-165
Electronic Edition (Springer LINK) BibTeX
- T. Mark A. Lomas:
You Can't Take It with You.
166-169
Electronic Edition (Springer LINK) BibTeX
- David Wheeler:
Protocols Using Keys from Faulty Data.
170-179
Electronic Edition (Springer LINK) BibTeX
- David Wheeler:
Protocols Using Keys from Faulty Data (Transcript of Discussion).
180-187
Electronic Edition (Springer LINK) BibTeX
- Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras:
On the Negotiation of Access Control Policies.
188-201
Electronic Edition (Springer LINK) BibTeX
- Virgil D. Gligor:
Negotiation of Access Control Policies (Transcript of Discussion).
202-212
Electronic Edition (Springer LINK) BibTeX
- Hassen Saïdi:
Intrusion-Tolerant Group Management in Enclaves.
213-216
Electronic Edition (Springer LINK) BibTeX
- James A. Malcolm:
Lightweight Authentication in a Mobile Network (Transcript of Discussion).
217-220
Electronic Edition (Springer LINK) BibTeX
- Peter Drabwell:
Bluetooth Security - Fact or Fiction? (Transcript of Discussion).
221-228
Electronic Edition (Springer LINK) BibTeX
- Bruce Christianson:
Concluding Discussion: When Does Confidentiality Harm Security?
229-238
Electronic Edition (Springer LINK) BibTeX
- Thucydides:
The Last Word.
239
Electronic Edition (Springer LINK) BibTeX
Copyright © Sat May 16 23:42:19 2009
by Michael Ley (ley@uni-trier.de)