Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 3364 : Security and Cryptology

ISBN: 3540283897, 9783540283898

Size: 3 MB (2662935 bytes)

Pages: 354/359

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.)3540283897, 9783540283898

Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely.

Table of contents :
Front Matter….Pages –
Where Have All the Protocols Gone?….Pages 1-2
A Protocol’s Life After Attacks…….Pages 3-10
A Protocol’s Life After Attacks…….Pages 11-18
Towards Flexible Credential Negotiation Protocols….Pages 19-23
Towards Flexible Credential Negotiation Protocols….Pages 24-27
Man-in-the-Middle in Tunnelled Authentication Protocols….Pages 28-41
Man-in-the-Middle in Tunnelled Authentication Protocols….Pages 42-48
Towards a Framework for Autonomic Security Protocols….Pages 49-54
Towards a Framework for Autonomic Security Protocols….Pages 55-62
Client v. Server Side Protocols, Interfaces and Storage….Pages 63-73
Client v. Server Side Protocols, Interfaces and Storage….Pages 74-79
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks….Pages 80-96
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks….Pages 97-105
Protocol Codesign….Pages 106-113
Protocol Codesign….Pages 114-118
Enforcing Security Policies for Distributed Objects Applications….Pages 119-130
Enforcing Security Policies for Distributed Objects Applications….Pages 131-133
Regular SPKI….Pages 134-150
Regular SPKI….Pages 151-152
Federated Identity-Management Protocols….Pages 153-174
Federated Identity-Management Protocols….Pages 175-177
Enforcing the Unenforceable….Pages 178-182
Is the Verification Problem for Cryptographic Protocols Solved?….Pages 183-189
Secure Sessions from Weak Secrets….Pages 190-205
Secure Sessions from Weak Secrets….Pages 206-212
Panel Session: Is Protocol Modelling Finished?….Pages 213-217
WAR: Wireless Anonymous Routing….Pages 218-232
WAR: Wireless Anonymous Routing….Pages 233-240
Limitations of IPsec Policy Mechanisms….Pages 241-251
Limitations of IPsec Policy Mechanisms….Pages 252-254
Deniable Authenticated Key Establishment for Internet Protocols….Pages 255-271
Deniable Authenticated Key Establishment for Internet Protocols….Pages 272-273
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks….Pages 274-282
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks….Pages 283-287
What We Can Learn from API Security….Pages 288-300
Addressing New Challenges by Building Security Protocols Around Graphs….Pages 301-306
From Security Protocols to Systems Security….Pages 307-322
From Security Protocols to Systems Security….Pages 323-323
Biometrics to Enhance Smartcard Security….Pages 324-332
Biometrics to Enhance Smartcard Security….Pages 333-335
Blind Publication: A Copyright Library without Publication or Trust….Pages 336-340
Blind Publication: A Copyright Library Without Publication or Trust….Pages 341-349
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers”
Shopping Cart
Scroll to Top