default search action
9. Security Protocols Workshop 2001: Cambridge, UK
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers. Lecture Notes in Computer Science 2467, Springer 2002, ISBN 3-540-44263-4 - Roger M. Needham:
Keynote Address: Mobile Computing versus Immobile Security. 1-3 - Michael Roe:
Experiences of Mobile IP Security. 4-11 - Pekka Nikander:
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World. 12-21 - Pekka Nikander:
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion). 22-26 - William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. 27-39 - Matt Blaze:
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion). 40-48 - Geraint Price:
Thwarting Timing Attacks Using ATM Networks. 49-58 - Geraint Price:
Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion). 59-62 - Tuomas Aura, Silja Mäki:
Towards a Survivable Security Architecture for Ad-Hoc Networks. 63-73 - Silja Mäki:
Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion). 74-79 - Dieter Gollmann:
PIM Security. 80-81 - Dieter Gollmann:
PIM Security (Transcript of Discussion). 82-86 - Bruce Christianson, David Wheeler:
Merkle Puzzles Revisited - Finding Matching Elements Between Lists. 87-90 - Bruce Christianson:
Merkle Puzzles Revisited (Transcript of Discussion). 91-94 - Jan Jürjens:
Encapsulating Rules of Prudent Security Engineering. 95-101 - Jan Jürjens:
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion). 102-106 - Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki:
A Multi-OS Approach to Trusted Computer Systems. 107-114 - Hiroshi Yoshiura:
A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion). 115-118 - Giampaolo Bella, Lawrence C. Paulson:
A Proof of Non-repudiation. 119-125 - Lawrence C. Paulson:
A Proof of Non-repudiation (Transcript of Discussion). 126-133 - Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann:
Using Authority Certificates to Create Management Structures. 134-145 - Babak Sadighi Firozabadi:
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion). 146-150 - Simon N. Foley:
Trust Management and Whether to Delegate. 151-157 - Simon N. Foley:
Trust Management and Whether to Delegate (Transcript of Discussion). 158-165 - T. Mark A. Lomas:
You Can't Take It with You. 166-169 - David Wheeler:
Protocols Using Keys from Faulty Data. 170-179 - David Wheeler:
Protocols Using Keys from Faulty Data (Transcript of Discussion). 180-187 - Virgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras:
On the Negotiation of Access Control Policies. 188-201 - Virgil D. Gligor:
Negotiation of Access Control Policies (Transcript of Discussion). 202-212 - Hassen Saïdi:
Intrusion-Tolerant Group Management in Enclaves. 213-216 - James A. Malcolm:
Lightweight Authentication in a Mobile Network (Transcript of Discussion). 217-220 - Peter Drabwell:
Bluetooth Security - Fact or Fiction? (Transcript of Discussion). 221-228 - Bruce Christianson:
Concluding Discussion: When Does Confidentiality Harm Security? 229-238 - Thucydides:
The Last Word. 239
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.