Skip to main content
  • Conference proceedings
  • © 2007

Security Protocols

13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4631)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols

Conference proceedings info: Security Protocols 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (44 papers)

  1. Front Matter

  2. The System Likes You

    • Bruce Christianson
    Pages 1-2
  3. Experiences with Host-to-Host IPsec

    • Tuomas Aura, Michael Roe, Anish Mohammed
    Pages 3-22
  4. Experiences with Host-to-Host IPsec

    • Tuomas Aura
    Pages 23-30
  5. Repairing the Bluetooth Pairing Protocol

    • Ford-Long Wong, Frank Stajano, Jolyon Clulow
    Pages 31-45
  6. Repairing the Bluetooth Pairing Protocol

    • Frank Stajano
    Pages 46-50
  7. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    • Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum
    Pages 51-59
  8. Keep on Blockin’ in the Free World

    • Melanie R. Rieback
    Pages 60-68
  9. PIN (and Chip) or Signature: Beating the Cheating?

    • Dan Cvrcek, Jan Krhovjak, Vashek Matyas
    Pages 69-75
  10. Multi-channel Protocols

    • Ford-Long Wong, Frank Stajano
    Pages 112-127
  11. Multi-channel Protocols

    • Ford-Long Wong
    Pages 128-132
  12. User-Friendly Grid Security Architecture and Protocols

    • Liqun Chen, Hoon Wei Lim, Wenbo Mao
    Pages 139-156
  13. Countering Automated Exploits with System Security CAPTCHAS

    • Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Austin Donnelly
    Pages 162-169

Other Volumes

  1. Security Protocols

About this book

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines of enquiry into interesting problems. Now we bring these proceedings to a wider audience so that you can join in. Our theme this time was “The systemlikes youandwants to be yourfriend.” Security is usually seen as making systems more di?cult for humans to use. Might there be advantages to looking at security in the context of more general design problems? Perhaps those investigating the general properties of system design and those of us in the security community have more to say to each other than we thought. Our thanks to Sidney Sussex CollegeCambridgefor the use of their facilities, and to the University of Hertfordshire for lending us several of their sta?. Particular thanks to Johanna Hunt of the University of Hertfordshire for being our impresario and organizing everything, and to Lori Klimaszewska of the University of CambridgeComputing Service for transcribing the audio tapes (in which the “crash barriers” nearly prevented collisions). The Security Protocols Workshop exists because you, the audience, part- ipate. Once you have dived into these proceedings and have had some Eleatic thoughts, we expect to hear from you.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access