


default search action
6. Security Protocols Workshop 1998: Cambridge, UK
- Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe:

Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings. Lecture Notes in Computer Science 1550, Springer 1999, ISBN 3-540-65663-4 - Lawrence C. Paulson:

Inductive Analysis of the Internet Protocol TLS (Position Paper). 1-12 - Lawrence C. Paulson:

Inductive Analysis of the Internet Protocol TLS (Transcript of Discussion). 13-23 - Simon N. Foley

:
External Consistency and the Verification of Security Protocols (Position Paper). 24-27 - Simon N. Foley

:
External Consistency and the Verification of Security Protocols (Transcript of Discussion). 28-35 - Carl M. Ellison:

The Trust Shell Game (Position Paper). 36-40 - Carl M. Ellison:

The Trust Shell Game (Transcript of Discussion). 41-44 - Joan Feigenbaum:

Overview of the AT&T Labs Trust-Management Project (Position Paper). 45-50 - Joan Feigenbaum:

Overview of the AT&T Labs Trust-Management Project (Transcript of Discussion). 51-58 - Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis:

KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). 59-63 - Discussion Session - Trust Management. 64-63

- Virgil D. Gligor, Serban I. Gavrila:

Application-Oriented Security Policies and Their Composition (Position Paper). 67-74 - Virgil D. Gligor:

Application-Oriented Security Policies and Their Composition (Transcript of Discussion). 75-82 - Hiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi:

Secure Fingerprinting Using Public-Key Cryptography (Position Paper). 83-89 - Ryôichi Sasaki:

Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion). 90-94 - Francesco Bergadano

, P. De Mauro:
Third Party Certification of HTTP Service Access Statistics (Position Paper). 95-99 - Francesco Bergadano

:
Third Party Certification of HTTP Service Access Statistics (Transcript of Discussion). 100-107 - William S. Harbison:

Delegating Trust (Transcript of Discussion). 108-117 - Bruno Crispo:

Delegation of Responsibility (Position Paper). 118-124 - Bruno Crispo:

Delegation of Responsibility (Transcript of Discussion). 125-130 - T. Mark A. Lomas:

Abuse of Process (Transcript of Discussion). 131-136 - Peter Landrock:

A New Concept in Protocols: Verifiable Computational Delegation (Position Paper). 137-145 - Peter Landrock:

A New Concept in Protocols: Verifiable Computational Delegation (Transcript of Discussion). 146-153 - Bruce Christianson

, James A. Malcolm:
Delegation and Not-So Smart Cards (Position Paper). 154-157 - Bruce Christianson:

Delegation and Not-So Smart Card (Transcript of Discussion). 158-167 - Michael Roe:

Certification and Delegation (Transcript of Discussion). 168-176 - Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne:

Discussion Session: Differences Between Academic and Commercial Security. 177-192 - Raphael Yahalom:

Optimistic Trust with Realistic eNvestigators (Position Paper). 193-202 - Raphael Yahalom:

Optimistic Trust with Realistic eNvestigators (Transcript of Discussion). 203-212 - Dieter Gollmann:

Insider Fraud (Position Paper). 213-219 - Dieter Gollmann:

Insider Fraud (Transcript of Discussion). 220-226 - Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson:

Panel Session - Future Directions. 227-239

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














