default search action
8. Security Protocols Workshop 2000: Cambridge, UK
- Bruce Christianson, Bruno Crispo, Michael Roe:
Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers. Lecture Notes in Computer Science 2133, Springer 2001, ISBN 3-540-42566-7 - Roger M. Needham:
Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). 1-4 - Dieter Gollmann:
Mergers and Principals. 5-13 - Dieter Gollmann:
Mergers and Principals (Transcript of Discussion). 14-19 - Michael Roe:
Authentication and Naming (Transcript of Discussion). 20-23 - Pekka Nikander, Kristiina Karvonen:
Users and Trust in Cyberspace. 24-35 - Pekka Nikander:
Users and Trust in Cyberspace (Transcript of Discussion). 36-42 - Peter Landrock:
Interactive Identification Protocols (Transcript of Discussion). 43-48 - Peter Ryan:
Open Questions (Transcript of Discussion). 49-53 - Matt Blaze:
Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). 54-61 - Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas:
Government Access to Keys - Panel Discussion. 62-73 - Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano:
Making Sense of Specifications: The Formalization of SET. 74-81 - Lawrence C. Paulson:
Making Sense of Specifications: The Formalization of SET (Transcript of Discussion). 82-86 - Giampaolo Bella:
Lack of Explicitness Strikes Back. 87-93 - Giampaolo Bella:
Lack of Explicitness Strikes Back (Transcript of Discussion). 94-99 - Himanshu Khurana, Virgil D. Gligor:
Review and Revocation of Access Privileges Distributed with PKI Certificates. 100-112 - Virgil D. Gligor:
Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). 113-124 - Ross J. Anderson:
The Correctness of Crypto Transaction Sets. 125-127 - Ross J. Anderson:
The Correctness of Crypto Transaction Sets (Discussion). 128-141 - John Ioannidis:
Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion). 142-154 - Geraint Price:
Broadening the Scope of Fault Tolerance within Secure Services. 155-164 - Geraint Price:
Broadening the Scope of Fault Tolerance within Secure Services (Transcript of Discussion). 165-169 - Tuomas Aura, Pekka Nikander, Jussipekka Leiwo:
DOS-Resistant Authentication with Client Puzzles. 170-177 - Tuomas Aura:
DOS-Resistant Authentication with Client Puzzles (Transcript of Discussion). 178-181 - Bruce Christianson, Bruno Crispo, James A. Malcolm:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. 182-183 - Bruce Christianson:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion). 184-193 - Virgil D. Gligor, Matt Blaze, John Ioannidis:
Denial of Service - Panel Discussion. 194-203 - Frank Stajano:
The Resurrecting Duckling - What Next? 204-214 - Frank Stajano:
The Resurrecting Duckling - What Next? (Transcript of Discussion). 215-222 - George Danezis:
An Anonymous Auction Protocol Using "Money Escrow" (Transcript of Discussion). 223-233 - Wenbo Mao:
Short Certification of Secure RSA Modulus (Transcript of Discussion). 234-237 - Hiroshi Yoshiura, Takaaki Shigematsu, Seiichi Susaki, Tsukasa Saitoh, Hisashi Toyoshima, Chikako Kurita, Satoru Tezuka, Ryôichi Sasaki:
Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis. 238-248 - Hiroshi Yoshiura:
Authentication Web-Based Virtual Shops Using Signature-Embedded Marks - A Practical Analysis (Transcript of Discussion). 249-252 - T. Mark A. Lomas:
I Cannot Tell a Lie (Transcript of Discussion). 253-255 - Afterward. 256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.