default search action
Search dblp for Publications
export results for "toc:db/conf/spw/spw1998.bht:"
@proceedings{DBLP:conf/spw/1998, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-49135-X}, doi = {10.1007/3-540-49135-X}, isbn = {3-540-65663-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Anonymous98, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Discussion Session - Trust Management}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {64--63}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_10}, doi = {10.1007/3-540-49135-X\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/Anonymous98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Bergadano98, author = {Francesco Bergadano}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Third Party Certification of {HTTP} Service Access Statistics (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {100--107}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_16}, doi = {10.1007/3-540-49135-X\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Bergadano98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BergadanoM98, author = {Francesco Bergadano and P. De Mauro}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Third Party Certification of {HTTP} Service Access Statistics (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {95--99}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_15}, doi = {10.1007/3-540-49135-X\_15}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BergadanoM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BlazeFK98, author = {Matt Blaze and Joan Feigenbaum and Angelos D. Keromytis}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {59--63}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_9}, doi = {10.1007/3-540-49135-X\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BlazeFK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson98, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Delegation and Not-So Smart Card (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {158--167}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_24}, doi = {10.1007/3-540-49135-X\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonM98, author = {Bruce Christianson and James A. Malcolm}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Delegation and Not-So Smart Cards (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {154--157}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_23}, doi = {10.1007/3-540-49135-X\_23}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Crispo98, author = {Bruno Crispo}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Delegation of Responsibility (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {118--124}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_18}, doi = {10.1007/3-540-49135-X\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Crispo98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Crispo98a, author = {Bruno Crispo}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Delegation of Responsibility (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {125--130}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_19}, doi = {10.1007/3-540-49135-X\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Crispo98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ellison98, author = {Carl M. Ellison}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {The Trust Shell Game (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {36--40}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_5}, doi = {10.1007/3-540-49135-X\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ellison98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Ellison98a, author = {Carl M. Ellison}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {The Trust Shell Game (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {41--44}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_6}, doi = {10.1007/3-540-49135-X\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Ellison98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Feigenbaum98, author = {Joan Feigenbaum}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Overview of the AT{\&}T Labs Trust-Management Project (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {45--50}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_7}, doi = {10.1007/3-540-49135-X\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Feigenbaum98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Feigenbaum98a, author = {Joan Feigenbaum}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Overview of the AT{\&}T Labs Trust-Management Project (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {51--58}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_8}, doi = {10.1007/3-540-49135-X\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Feigenbaum98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley98, author = {Simon N. Foley}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {External Consistency and the Verification of Security Protocols (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {24--27}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_3}, doi = {10.1007/3-540-49135-X\_3}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Foley98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley98a, author = {Simon N. Foley}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {External Consistency and the Verification of Security Protocols (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {28--35}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_4}, doi = {10.1007/3-540-49135-X\_4}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Foley98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gligor98, author = {Virgil D. Gligor}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Application-Oriented Security Policies and Their Composition (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {75--82}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_12}, doi = {10.1007/3-540-49135-X\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gligor98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorG98, author = {Virgil D. Gligor and Serban I. Gavrila}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Application-Oriented Security Policies and Their Composition (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {67--74}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_11}, doi = {10.1007/3-540-49135-X\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/GligorLLYW98, author = {Virgil D. Gligor and Peter Landrock and T. Mark A. Lomas and Raphael Yahalom and John P. Warne}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Discussion Session: Differences Between Academic and Commercial Security}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {177--192}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_26}, doi = {10.1007/3-540-49135-X\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/GligorLLYW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann98, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Insider Fraud (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {213--219}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_29}, doi = {10.1007/3-540-49135-X\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Gollmann98a, author = {Dieter Gollmann}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Insider Fraud (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {220--226}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_30}, doi = {10.1007/3-540-49135-X\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Gollmann98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Harbison98, author = {William S. Harbison}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Delegating Trust (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {108--117}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_17}, doi = {10.1007/3-540-49135-X\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Harbison98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Landrock98, author = {Peter Landrock}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {A New Concept in Protocols: Verifiable Computational Delegation (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {137--145}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_21}, doi = {10.1007/3-540-49135-X\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Landrock98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Landrock98a, author = {Peter Landrock}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {A New Concept in Protocols: Verifiable Computational Delegation (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {146--153}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_22}, doi = {10.1007/3-540-49135-X\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Landrock98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Lomas98, author = {T. Mark A. Lomas}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Abuse of Process (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {131--136}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_20}, doi = {10.1007/3-540-49135-X\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Lomas98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NeedhamLFGC98, author = {Roger M. Needham and E. Stewart Lee and Joan Feigenbaum and Virgil D. Gligor and Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Panel Session - Future Directions}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {227--239}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_31}, doi = {10.1007/3-540-49135-X\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/NeedhamLFGC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Paulson98, author = {Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Inductive Analysis of the Internet Protocol {TLS} (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {1--12}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_1}, doi = {10.1007/3-540-49135-X\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Paulson98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Paulson98a, author = {Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Inductive Analysis of the Internet Protocol {TLS} (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {13--23}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_2}, doi = {10.1007/3-540-49135-X\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Paulson98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Roe98, author = {Michael Roe}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Certification and Delegation (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {168--176}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_25}, doi = {10.1007/3-540-49135-X\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Roe98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Sasaki98, author = {Ry{\^{o}}ichi Sasaki}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {90--94}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_14}, doi = {10.1007/3-540-49135-X\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Sasaki98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yahalom98, author = {Raphael Yahalom}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Optimistic Trust with Realistic \emph{e}Nvestigators (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {193--202}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_27}, doi = {10.1007/3-540-49135-X\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yahalom98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yahalom98a, author = {Raphael Yahalom}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Optimistic Trust with Realistic \emph{e}Nvestigators (Transcript of Discussion)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {203--212}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_28}, doi = {10.1007/3-540-49135-X\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yahalom98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraST98, author = {Hiroshi Yoshiura and Ry{\^{o}}ichi Sasaki and Kazuo Takaragi}, editor = {Bruce Christianson and Bruno Crispo and William S. Harbison and Michael Roe}, title = {Secure Fingerprinting Using Public-Key Cryptography (Position Paper)}, booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1550}, pages = {83--89}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49135-X\_13}, doi = {10.1007/3-540-49135-X\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraST98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.