Security and Cryptology

Security Protocols

13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers

Editors: Christianson, B., Crispo, B., Malcom, J.A., Roe, M. (Eds.)

Buy this book

eBook $79.99
price for USA (gross)
  • ISBN 978-3-540-77156-2
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $109.00
price for USA
  • ISBN 978-3-540-77155-5
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines of enquiry into interesting problems. Now we bring these proceedings to a wider audience so that you can join in. Our theme this time was “The systemlikes youandwants to be yourfriend.” Security is usually seen as making systems more di?cult for humans to use. Might there be advantages to looking at security in the context of more general design problems? Perhaps those investigating the general properties of system design and those of us in the security community have more to say to each other than we thought. Our thanks to Sidney Sussex CollegeCambridgefor the use of their facilities, and to the University of Hertfordshire for lending us several of their sta?. Particular thanks to Johanna Hunt of the University of Hertfordshire for being our impresario and organizing everything, and to Lori Klimaszewska of the University of CambridgeComputing Service for transcribing the audio tapes (in which the “crash barriers” nearly prevented collisions). The Security Protocols Workshop exists because you, the audience, part- ipate. Once you have dived into these proceedings and have had some Eleatic thoughts, we expect to hear from you.

Table of contents (44 chapters)

  • The System Likes You

    Christianson, Bruce

    Pages 1-2

  • Experiences with Host-to-Host IPsec

    Aura, Tuomas (et al.)

    Pages 3-22

  • Experiences with Host-to-Host IPsec

    Aura, Tuomas

    Pages 23-30

  • Repairing the Bluetooth Pairing Protocol

    Wong, Ford-Long (et al.)

    Pages 31-45

  • Repairing the Bluetooth Pairing Protocol

    Stajano, Frank

    Pages 46-50

Buy this book

eBook $79.99
price for USA (gross)
  • ISBN 978-3-540-77156-2
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $109.00
price for USA
  • ISBN 978-3-540-77155-5
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Security Protocols
Book Subtitle
13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
Editors
  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcom
  • Michael Roe
Series Title
Security and Cryptology
Series Volume
4631
Copyright
2007
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-77156-2
DOI
10.1007/978-3-540-77156-2
Softcover ISBN
978-3-540-77155-5
Edition Number
1
Number of Pages
IX, 350
Topics