Skip to main content
  • Conference proceedings
  • © 2011

Security Protocols XVI

16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers

  • Up-to-date results
  • Fast-track conference proceedings
  • State-of-the-art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6615)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols

Conference proceedings info: Security Protocols 2008.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (34 papers)

  1. Front Matter

  2. Fighting the ‘Good’ Internet War

    • Dan Cvrček, George Danezis
    Pages 3-11
  3. Security Protocol Deployment Risk

    • Simon N. Foley, Giampaolo Bella, Stefano Bistarelli
    Pages 12-20
  4. Do Not Model the Attacker

    • Jan Meier
    Pages 25-35
  5. Generating Random Numbers in Hostile Environments

    • Jan Krhovjak, Andriy Stetsko, Vashek Matyas
    Pages 38-50
  6. Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters

    • Frank Stajano, Richard Clayton
    Pages 54-70
  7. Cyberdice (Transcript of Discussion)

    • Frank Stajano
    Pages 71-83
  8. Problems with Same Origin Policy

    • Dieter Gollmann
    Pages 84-85
  9. Hardened Stateless Session Cookies

    • Steven J. Murdoch
    Pages 93-101
  10. Handling New Adversaries in Wireless Ad-Hoc Networks

    • S. Farshad Bahari, Virgil D. Gligor
    Pages 118-119

Other Volumes

  1. Security Protocols XVI

About this book

This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was “Remodelling the Attacker” with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn’t the attacker’s capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.

Editors and Affiliations

  • Computer Science Department, University of Hertfordshire, Hatfield, UK

    Bruce Christianson, James A. Malcolm, Michael Roe

  • Faculty of Informatics, Masaryk University, Brno, Czech Republic

    Vashek Matyas

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access