Search dblp for Publications

export results for "toc:db/conf/spw/spw1998.bht:"

 download as .bib file

@proceedings{DBLP:conf/spw/1998,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-49135-X},
  doi          = {10.1007/3-540-49135-X},
  isbn         = {3-540-65663-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Anonymous98,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Discussion Session - Trust Management},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {64--63},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_10},
  doi          = {10.1007/3-540-49135-X\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Anonymous98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Bergadano98,
  author       = {Francesco Bergadano},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Third Party Certification of {HTTP} Service Access Statistics (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {100--107},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_16},
  doi          = {10.1007/3-540-49135-X\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Bergadano98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BergadanoM98,
  author       = {Francesco Bergadano and
                  P. De Mauro},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Third Party Certification of {HTTP} Service Access Statistics (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {95--99},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_15},
  doi          = {10.1007/3-540-49135-X\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BergadanoM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeFK98,
  author       = {Matt Blaze and
                  Joan Feigenbaum and
                  Angelos D. Keromytis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {KeyNote: Trust Management for Public-Key Infrastructures (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {59--63},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_9},
  doi          = {10.1007/3-540-49135-X\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BlazeFK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson98,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Delegation and Not-So Smart Card (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {158--167},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_24},
  doi          = {10.1007/3-540-49135-X\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonM98,
  author       = {Bruce Christianson and
                  James A. Malcolm},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Delegation and Not-So Smart Cards (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {154--157},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_23},
  doi          = {10.1007/3-540-49135-X\_23},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Crispo98,
  author       = {Bruno Crispo},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Delegation of Responsibility (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {118--124},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_18},
  doi          = {10.1007/3-540-49135-X\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Crispo98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Crispo98a,
  author       = {Bruno Crispo},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Delegation of Responsibility (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {125--130},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_19},
  doi          = {10.1007/3-540-49135-X\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Crispo98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ellison98,
  author       = {Carl M. Ellison},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {The Trust Shell Game (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {36--40},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_5},
  doi          = {10.1007/3-540-49135-X\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ellison98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Ellison98a,
  author       = {Carl M. Ellison},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {The Trust Shell Game (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {41--44},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_6},
  doi          = {10.1007/3-540-49135-X\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Ellison98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Feigenbaum98,
  author       = {Joan Feigenbaum},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Overview of the AT{\&}T Labs Trust-Management Project (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {45--50},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_7},
  doi          = {10.1007/3-540-49135-X\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Feigenbaum98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Feigenbaum98a,
  author       = {Joan Feigenbaum},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Overview of the AT{\&}T Labs Trust-Management Project (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {51--58},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_8},
  doi          = {10.1007/3-540-49135-X\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Feigenbaum98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley98,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {External Consistency and the Verification of Security Protocols (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {24--27},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_3},
  doi          = {10.1007/3-540-49135-X\_3},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Foley98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley98a,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {External Consistency and the Verification of Security Protocols (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {28--35},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_4},
  doi          = {10.1007/3-540-49135-X\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Foley98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gligor98,
  author       = {Virgil D. Gligor},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Application-Oriented Security Policies and Their Composition (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {75--82},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_12},
  doi          = {10.1007/3-540-49135-X\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gligor98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorG98,
  author       = {Virgil D. Gligor and
                  Serban I. Gavrila},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Application-Oriented Security Policies and Their Composition (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {67--74},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_11},
  doi          = {10.1007/3-540-49135-X\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/GligorLLYW98,
  author       = {Virgil D. Gligor and
                  Peter Landrock and
                  T. Mark A. Lomas and
                  Raphael Yahalom and
                  John P. Warne},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Discussion Session: Differences Between Academic and Commercial Security},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {177--192},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_26},
  doi          = {10.1007/3-540-49135-X\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/GligorLLYW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann98,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Insider Fraud (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {213--219},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_29},
  doi          = {10.1007/3-540-49135-X\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Gollmann98a,
  author       = {Dieter Gollmann},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Insider Fraud (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {220--226},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_30},
  doi          = {10.1007/3-540-49135-X\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Gollmann98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Harbison98,
  author       = {William S. Harbison},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Delegating Trust (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {108--117},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_17},
  doi          = {10.1007/3-540-49135-X\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Harbison98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Landrock98,
  author       = {Peter Landrock},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {A New Concept in Protocols: Verifiable Computational Delegation (Position
                  Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {137--145},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_21},
  doi          = {10.1007/3-540-49135-X\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Landrock98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Landrock98a,
  author       = {Peter Landrock},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {A New Concept in Protocols: Verifiable Computational Delegation (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {146--153},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_22},
  doi          = {10.1007/3-540-49135-X\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Landrock98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Lomas98,
  author       = {T. Mark A. Lomas},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Abuse of Process (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {131--136},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_20},
  doi          = {10.1007/3-540-49135-X\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Lomas98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NeedhamLFGC98,
  author       = {Roger M. Needham and
                  E. Stewart Lee and
                  Joan Feigenbaum and
                  Virgil D. Gligor and
                  Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Panel Session - Future Directions},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {227--239},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_31},
  doi          = {10.1007/3-540-49135-X\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NeedhamLFGC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Paulson98,
  author       = {Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Inductive Analysis of the Internet Protocol {TLS} (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_1},
  doi          = {10.1007/3-540-49135-X\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Paulson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Paulson98a,
  author       = {Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Inductive Analysis of the Internet Protocol {TLS} (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {13--23},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_2},
  doi          = {10.1007/3-540-49135-X\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Paulson98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Roe98,
  author       = {Michael Roe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Certification and Delegation (Transcript of Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {168--176},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_25},
  doi          = {10.1007/3-540-49135-X\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Roe98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Sasaki98,
  author       = {Ry{\^{o}}ichi Sasaki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Secure Fingerprinting Using Public-Key Cryptography (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {90--94},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_14},
  doi          = {10.1007/3-540-49135-X\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Sasaki98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yahalom98,
  author       = {Raphael Yahalom},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Optimistic Trust with Realistic \emph{e}Nvestigators (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {193--202},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_27},
  doi          = {10.1007/3-540-49135-X\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yahalom98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yahalom98a,
  author       = {Raphael Yahalom},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Optimistic Trust with Realistic \emph{e}Nvestigators (Transcript of
                  Discussion)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {203--212},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_28},
  doi          = {10.1007/3-540-49135-X\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yahalom98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraST98,
  author       = {Hiroshi Yoshiura and
                  Ry{\^{o}}ichi Sasaki and
                  Kazuo Takaragi},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  William S. Harbison and
                  Michael Roe},
  title        = {Secure Fingerprinting Using Public-Key Cryptography (Position Paper)},
  booktitle    = {Security Protocols, 6th International Workshop, Cambridge, UK, April
                  15-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1550},
  pages        = {83--89},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49135-X\_13},
  doi          = {10.1007/3-540-49135-X\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraST98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}