Security Protocols

11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers

  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Conference proceedings Security Protocols 2003

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3364)

Table of contents

  1. Front Matter
  2. Bruce Christianson
    Pages 1-2
  3. Giampaolo Bella, Stefano Bistarelli, Fabio Massacci
    Pages 3-10
  4. Giampaolo Bella
    Pages 11-18
  5. Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati
    Pages 19-23
  6. Pierangela Samarati
    Pages 24-27
  7. N. Asokan, Valtteri Niemi, Kaisa Nyberg
    Pages 28-41
  8. Simon N. Foley, Hongbin Zhou
    Pages 49-54
  9. Hassen Saïdi, Victoria Stavridou, Bruno Duterte
    Pages 106-113
  10. Victoria Stavridou
    Pages 114-118
  11. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman
    Pages 119-130
  12. Mads Dam
    Pages 134-150
  13. Mads Dam
    Pages 151-152
  14. Birgit Pfitzmann, Michael Waidner
    Pages 153-174
  15. Birgit Pfitzmann
    Pages 175-177
  16. Peter Y. A. Ryan
    Pages 178-182
  17. Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson
    Pages 183-189
  18. Bruce Christianson, Michael Roe, David Wheeler
    Pages 190-205
  19. Bruce Christianson
    Pages 206-212
  20. Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Avi Rubin
    Pages 218-232
  21. Matt Blaze
    Pages 233-240
  22. Jari Arkko, Pekka Nikander
    Pages 241-251
  23. Jari Arkko
    Pages 252-254
  24. Colin Boyd, Wenbo Mao, Kenneth G. Paterson
    Pages 255-271
  25. Ross Anderson
    Pages 288-300
  26. Kamil Kulesza, Zbigniew Kotulski
    Pages 301-306
  27. Brian Monahan
    Pages 307-322
  28. Brian Monahan
    Pages 323-323
  29. Giampaolo Bella, Stefano Bistarelli, Fabio Martinelli
    Pages 324-332
  30. Fabio Martinelli
    Pages 333-335
  31. Back Matter

About these proceedings


Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely.


Bridge Denial of Service access control ad-hoc network security anonymity authentication cryptographic protocols delegation information security internet security mobile security network security secure group communicati security verification

Editors and affiliations

  • Bruce Christianson
  • Bruno Crispo
    • 1
  • James A. Malcolm
    • 2
  • Michael Roe
    • 3
  1. 1.Computer Systems GroupVrije UniversiteitAmsterdamThe Netherlands
  2. 2.Georgia Institute of TechnologyAtlantaGA
  3. 3.Microsoft ResearchCambridgeUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-28389-8
  • Online ISBN 978-3-540-31836-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site