Security Protocols

12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers

  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Conference proceedings Security Protocols 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3957)

Table of contents

  1. Front Matter
  2. Bruce Christianson
    Pages 1-3
  3. Andreas Pashalidis, Chris J. Mitchell
    Pages 4-12
  4. Endre Bangerter, Jan Camenisch, Anna Lysyanskaya
    Pages 20-42
  5. Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac
    Pages 83-95
  6. Rebecca N. Wright
    Pages 96-105
  7. Tuomas Aura, Alf Zugenmaier
    Pages 133-145
  8. Denis Bohm, Mik Lamming, Robert N. Mayo, Jeff Morgan, Kan Zhang
    Pages 151-154
  9. Jukka Ylitalo, Pekka Nikander
    Pages 163-176
  10. Fabio Massacci, Nicola Zannone
    Pages 179-191
  11. Laurent Bussard, Refik Molva
    Pages 199-209
  12. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum
    Pages 213-220
  13. Dieter Gollmann
    Pages 246-250
  14. Dieter Gollmann
    Pages 251-255
  15. Daniel Cvrček, Václav Matyáš Jr.
    Pages 267-274
  16. Mikio Hashimoto, Hiroyoshi Haruki, Takeshi Kawabata
    Pages 276-286
  17. Partha Das Chowdhury, Bruce Christianson, James Malcolm
    Pages 299-305
  18. Bruce Christianson
    Pages 306-311
  19. Erik Rissanen, Babak Sadighi Firozabadi, Marek Sergot
    Pages 312-319
  20. David Wheeler
    Pages 324-324
  21. Back Matter

About these proceedings


Here are the proceedings of the 12th International Workshop on Security P- tocols. We hope that you will enjoy them, and that they will cause you to think at least one heretical thought. Please write or e-mail and share it with us. Our theme this workshop was “Authentic Privacy.” Traditionally we have based authentication upon a rather strong notion of identity, and have then built other security services on top of authentication. Perhaps if we want a more nuanced notion of privacy, then we need to re-examine some of our assu- tions, particularly when attackers and defenders share the same resources and infrastructure. The position papers published here have been revised by the participants in the workshop, and are followed by edited (heavily in some cases) transcripts of parts of the discussions which they led. Our thanks to Sidney Sussex CollegeCambridgefor the use of their facilities, to Johanna Hunt at the University of Hertfordshire for organizing the logistics of the workshop and orchestrating the production of these proceedings, to Lori KlimaszewskaoftheUniversityofCambridgeComputingServicefortranscribing the audio tapes (in which “viruses without halos” could have caused havoc but didn’t), and to Donald Hunt for impeccable copyediting. Finally, it is both a sadness and a pleasure to pay our tribute to David Wheeler,oneoftheoriginalforty-ninersattheCambridgeComputerLaboratory and author of the initial orders for EDSAC. The second version of initial orders is the Platonic bootstrap.


Bridge Denial of Service access control ad-hoc network security anonymity authentication block/stream ciphers cryptographic protocols delegation information security mobile security network security protocol attacks security verification

Editors and affiliations

  • Bruce Christianson
    • 1
  • Bruno Crispo
    • 2
  • James A. Malcolm
    • 3
  • Michael Roe
    • 4
  1. 1.Computer Science DepartmentUniversity of HertfordshireUK
  2. 2.Computer Systems GroupVrije UniversiteitAmsterdamThe Netherlands
  3. 3.Georgia Institute of TechnologyAtlantaUSA
  4. 4.Microsoft ResearchCambridgeUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-40925-0
  • Online ISBN 978-3-540-40926-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site