default search action
6. Security Protocols Workshop 1998: Cambridge, UK
- Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe:
Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings. Lecture Notes in Computer Science 1550, Springer 1999, ISBN 3-540-65663-4 - Lawrence C. Paulson:
Inductive Analysis of the Internet Protocol TLS (Position Paper). 1-12 - Lawrence C. Paulson:
Inductive Analysis of the Internet Protocol TLS (Transcript of Discussion). 13-23 - Simon N. Foley:
External Consistency and the Verification of Security Protocols (Position Paper). 24-27 - Simon N. Foley:
External Consistency and the Verification of Security Protocols (Transcript of Discussion). 28-35 - Carl M. Ellison:
The Trust Shell Game (Position Paper). 36-40 - Carl M. Ellison:
The Trust Shell Game (Transcript of Discussion). 41-44 - Joan Feigenbaum:
Overview of the AT&T Labs Trust-Management Project (Position Paper). 45-50 - Joan Feigenbaum:
Overview of the AT&T Labs Trust-Management Project (Transcript of Discussion). 51-58 - Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis:
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper). 59-63 - Discussion Session - Trust Management. 64-63
- Virgil D. Gligor, Serban I. Gavrila:
Application-Oriented Security Policies and Their Composition (Position Paper). 67-74 - Virgil D. Gligor:
Application-Oriented Security Policies and Their Composition (Transcript of Discussion). 75-82 - Hiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi:
Secure Fingerprinting Using Public-Key Cryptography (Position Paper). 83-89 - Ryôichi Sasaki:
Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion). 90-94 - Francesco Bergadano, P. De Mauro:
Third Party Certification of HTTP Service Access Statistics (Position Paper). 95-99 - Francesco Bergadano:
Third Party Certification of HTTP Service Access Statistics (Transcript of Discussion). 100-107 - William S. Harbison:
Delegating Trust (Transcript of Discussion). 108-117 - Bruno Crispo:
Delegation of Responsibility (Position Paper). 118-124 - Bruno Crispo:
Delegation of Responsibility (Transcript of Discussion). 125-130 - T. Mark A. Lomas:
Abuse of Process (Transcript of Discussion). 131-136 - Peter Landrock:
A New Concept in Protocols: Verifiable Computational Delegation (Position Paper). 137-145 - Peter Landrock:
A New Concept in Protocols: Verifiable Computational Delegation (Transcript of Discussion). 146-153 - Bruce Christianson, James A. Malcolm:
Delegation and Not-So Smart Cards (Position Paper). 154-157 - Bruce Christianson:
Delegation and Not-So Smart Card (Transcript of Discussion). 158-167 - Michael Roe:
Certification and Delegation (Transcript of Discussion). 168-176 - Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne:
Discussion Session: Differences Between Academic and Commercial Security. 177-192 - Raphael Yahalom:
Optimistic Trust with Realistic eNvestigators (Position Paper). 193-202 - Raphael Yahalom:
Optimistic Trust with Realistic eNvestigators (Transcript of Discussion). 203-212 - Dieter Gollmann:
Insider Fraud (Position Paper). 213-219 - Dieter Gollmann:
Insider Fraud (Transcript of Discussion). 220-226 - Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson:
Panel Session - Future Directions. 227-239
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.