default search action
10. Security Protocols Workshop 2002: Cambridge, UK
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers. Lecture Notes in Computer Science 2845, Springer 2004, ISBN 3-540-20830-5 - Bruce Christianson:
Introduction (Transcript). 1 - Roger M. Needham:
Keynote Address. 2-4 - Jari Arkko, Pekka Nikander:
Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties. 5-19 - Chris J. Mitchell, Paulo S. Pagliusi:
Is Entity Authentication Necessary? 20-33 - Wenbo Mao:
A Structured Operational Modelling of the Dolev-Yao Threat Model. 34-46 - Laurent Eschenauer, Virgil D. Gligor, John S. Baras:
On Trust Establishment in Mobile Ad-Hoc Networks. 47-66 - Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki:
Legally Authorized and Unauthorized Digital Evidence. 67-73 - Bruce Christianson, Jean Fiona Snook:
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. 74-95 - Babak Sadighi Firozabadi, Marek J. Sergot:
Contractual Access Control. 96-103 - Giampaolo Bella, Stefano Bistarelli:
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks. 104-119 - Giampaolo Bella, Lawrence C. Paulson:
Analyzing Delegation Properties. 120-127 - Ryôichi Sasaki, Hiroshi Yoshiura, Shinji Itoh:
Combinatorial Optimization of Countermeasures against Illegal Copying. 128-144 - Raphael Yahalom:
Protocols with Certified-Transfer Servers. 145-157 - Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe:
An Architecture for an Adaptive Intrusion-Tolerant Server. 158-178 - Simon N. Foley:
Supporting Imprecise Delegation in KeyNote. 179-188 - Alec Yasinsac, James A. Davis:
Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract). 189-202 - Pekka Nikander, Jari Arkko:
Delegation of Signalling Rights. 203-214 - Tuomas Aura:
Mobile IPv6 Security. 215-234 - Bruce Christianson:
Concluding Discussion: Accounting for Resources. 235-241 - Roger M. Needham:
Back to the Beginning. 242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.