Read While You Wait - Get immediate ebook access, if available*, when you order a print book

Lecture Notes in Computer Science

Security Protocols

9th International Workshop, Cambridge, UK, April 25-27, 2001 Revised Papers

Editors: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (Eds.)

Free Preview

Buy this book

eBook $74.99
price for USA in USD
  • ISBN 978-3-540-45807-4
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.00
price for USA in USD
  • ISBN 978-3-540-44263-9
  • Free shipping for individuals worldwide
  • Immediate ebook access, if available*, with your print order
  • Usually dispatched within 3 to 5 business days.
About this book

Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This year our theme was “mobile computing versus immobile security”. As usual, the insights and challenges which emerged during the workshop are re?ected in the position papers, which appear here in rewritten form. Transcripts are also included of the discussions which took place in C- bridge as the initial versions were presented. These transcripts are intended to provide a perspective on lines of argument which are worth pursuing further. Our desire is that you will join with us in this activity, and that as a result you will, like many of our participants, feel moved to propound something quite di?erent from what you originally planned. Our thanks as always to Prof. Roger Needham, FRS and to Microsoft - search Ltd. (Cambridge) for the use of the meeting room and co?ee machine. Thanks also to Lori Klimaszewska of the University of Cambridge Computing Service for transcribing the audio tapes (and for revealing in “Audrey James” a previously unsuspected double life of a well-known double agent), and to Dr. Mary Buchanan for her assistance in editing the transcripts into a Thucydidean mould. Actually, we are often asked how we go about producing the transcripts, especially upon those occasions when, for various reasons, no audio recording was made. This year we bow to pressure and reveal the details of our methodology in the Afterword.

Table of contents (34 chapters)

Table of contents (34 chapters)
  • Keynote Address: Mobile Computing versus Immobile Security

    Pages 1-3

    Needham, Roger

  • Experiences of Mobile IP Security

    Pages 4-11

    Roe, Michael

  • Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World

    Pages 12-21

    Nikander, Pekka

  • Denial of sService, Address Ownership, and Early Authentication in the IPv6 World

    Pages 22-26

    Nikander, Pekka

  • Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols

    Pages 27-39

    Aiello, William (et al.)

Buy this book

eBook $74.99
price for USA in USD
  • ISBN 978-3-540-45807-4
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.00
price for USA in USD
  • ISBN 978-3-540-44263-9
  • Free shipping for individuals worldwide
  • Immediate ebook access, if available*, with your print order
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Security Protocols
Book Subtitle
9th International Workshop, Cambridge, UK, April 25-27, 2001 Revised Papers
Editors
  • Bruce Christianson
  • Bruno Crispo
  • James A. Malcolm
  • Michael Roe
Series Title
Lecture Notes in Computer Science
Series Volume
2467
Copyright
2002
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-45807-4
DOI
10.1007/3-540-45807-7
Softcover ISBN
978-3-540-44263-9
Series ISSN
0302-9743
Edition Number
1
Number of Pages
X, 246
Topics

*immediately available upon purchase as print book shipments may be delayed due to the COVID-19 crisis. ebook access is temporary and does not include ownership of the ebook. Only valid for books with an ebook version. Springer Reference Works are not included.