


default search action
11. Security Protocols Workshop 2003: Cambridge, UK
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:

Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers. Lecture Notes in Computer Science 3364, Springer 2005, ISBN 3-540-28389-7 - Bruce Christianson

:
Where Have All the Protocols Gone? 1-2 - Giampaolo Bella

, Stefano Bistarelli
, Fabio Massacci
:
A Protocol's Life After Attacks.... 3-10 - Giampaolo Bella

:
A Protocol's Life After Attacks... (Discussion). 11-18 - Piero A. Bonatti

, Sabrina De Capitani di Vimercati
, Pierangela Samarati
:
Towards Flexible Credential Negotiation Protocols. 19-23 - Pierangela Samarati

:
Towards Flexible Credential Negotiation Protocols (Discussion). 24-27 - N. Asokan

, Valtteri Niemi, Kaisa Nyberg:
Man-in-the-Middle in Tunnelled Authentication Protocols. 28-41 - N. Asokan

:
Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion). 42-48 - Simon N. Foley

, Hongbin Zhou:
Towards a Framework for Autonomic Security Protocols. 49-54 - Simon N. Foley

:
Towards a Framework for Autonomic Security Protocols (Discussion). 55-62 - Geraint Price:

Client v. Server Side Protocols, Interfaces and Storage. 63-73 - Geraint Price:

Client v. Server Side Protocols, Interfaces and Storage (Discussion). 74-79 - Virgil D. Gligor:

Guaranteeing Access in Spite of Distributed Service-Flooding Attacks. 80-96 - Virgil D. Gligor:

Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion). 97-105 - Hassen Saïdi, Victoria Stavridou, Bruno Dutertre:

Protocol Codesign. 106-113 - Victoria Stavridou:

Protocol Codesign (Discussion). 114-118 - Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman:

Enforcing Security Policies for Distributed Objects Applications. 119-130 - Bogdan C. Popescu:

Enforcing Security Policies for Distributed Objects Applications (Discussion). 131-133 - Mads Dam:

Regular SPKI. 134-150 - Mads Dam:

Regular SPKI (Discussion). 151-152 - Birgit Pfitzmann, Michael Waidner

:
Federated Identity-Management Protocols. 153-174 - Birgit Pfitzmann:

Federated Identity-Management Protocols (Discussion). 175-177 - Peter Y. A. Ryan

:
Enforcing the Unenforceable. 178-182 - Giampaolo Bella

, Cristiano Longo, Lawrence C. Paulson
:
Is the Verification Problem for Cryptographic Protocols Solved?. 183-189 - Bruce Christianson

, Michael Roe, David Wheeler:
Secure Sessions from Weak Secrets. 190-205 - Bruce Christianson:

Secure Sessions from Weak Secrets (Discussion). 206-212 - Michael Roe:

Panel Session: Is Protocol Modelling Finished? 213-217 - Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin:

WAR: Wireless Anonymous Routing. 218-232 - Matt Blaze:

WAR: Wireless Anonymous Routing (Discussion). 233-240 - Jari Arkko, Pekka Nikander:

Limitations of IPsec Policy Mechanisms. 241-251 - Jari Arkko:

Limitations of IPsec Policy Mechanisms (Discussion). 252-254 - Colin Boyd, Wenbo Mao, Kenneth G. Paterson:

Deniable Authenticated Key Establishment for Internet Protocols. 255-271 - Wenbo Mao:

Deniable Authenticated Key Establishment for Internet Protocols (Discussion). 272-273 - Mike Burmester, Alec Yasinsac:

Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. 274-282 - Alec Yasinsac:

Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion). 283-287 - Ross J. Anderson:

What We Can Learn from API Security. 288-300 - Kamil Kulesza, Zbigniew Kotulski

:
Addressing New Challenges by Building Security Protocols Around Graphs. 301-306 - Brian Monahan:

From Security Protocols to Systems Security. 307-322 - Brian Monahan:

From Security Protocols to Systems Security (Discussion). 323-323 - Giampaolo Bella

, Stefano Bistarelli
, Fabio Martinelli:
Biometrics to Enhance Smartcard Security. 324-332 - Fabio Martinelli:

Biometrics to Enhance Smartcard Security (Discussion). 333-335 - James A. Malcolm:

Blind Publication: A Copyright Library without Publication or Trust. 336-340 - James A. Malcolm:

Blind Publication: A Copyright Library Without Publication or Trust (Discussion). 341-349

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














