Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/spw/spw2002.bht:"
@proceedings{DBLP:conf/spw/2002, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b94819}, doi = {10.1007/B94819}, isbn = {3-540-20830-5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ArkkoN02, author = {Jari Arkko and Pekka Nikander}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {5--19}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_3}, doi = {10.1007/978-3-540-39871-4\_3}, timestamp = {Sat, 05 Sep 2020 18:04:37 +0200}, biburl = {https://dblp.org/rec/conf/spw/ArkkoN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Aura02, author = {Tuomas Aura}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Mobile IPv6 Security}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {215--234}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_18}, doi = {10.1007/978-3-540-39871-4\_18}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Aura02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaB02, author = {Giampaolo Bella and Stefano Bistarelli}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {104--119}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_10}, doi = {10.1007/978-3-540-39871-4\_10}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BellaP02, author = {Giampaolo Bella and Lawrence C. Paulson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Analyzing Delegation Properties}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {120--127}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_11}, doi = {10.1007/978-3-540-39871-4\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/BellaP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson02, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Introduction (Transcript)}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {1}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_1}, doi = {10.1007/978-3-540-39871-4\_1}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Christianson02a, author = {Bruce Christianson}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Concluding Discussion: Accounting for Resources}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {235--241}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_19}, doi = {10.1007/978-3-540-39871-4\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Christianson02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ChristiansonS02, author = {Bruce Christianson and Jean Fiona Snook}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Shrink-Wrapped Optimism: The {DODA} Approach to Distributed Document Processing}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {74--95}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_8}, doi = {10.1007/978-3-540-39871-4\_8}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ChristiansonS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/EschenauerGB02, author = {Laurent Eschenauer and Virgil D. Gligor and John S. Baras}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {On Trust Establishment in Mobile Ad-Hoc Networks}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {47--66}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_6}, doi = {10.1007/978-3-540-39871-4\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/EschenauerGB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FirozabadiS02, author = {Babak Sadighi Firozabadi and Marek J. Sergot}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Contractual Access Control}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {96--103}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_9}, doi = {10.1007/978-3-540-39871-4\_9}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/FirozabadiS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Foley02, author = {Simon N. Foley}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Supporting Imprecise Delegation in KeyNote}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {179--188}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_15}, doi = {10.1007/978-3-540-39871-4\_15}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Foley02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mao02, author = {Wenbo Mao}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {A Structured Operational Modelling of the Dolev-Yao Threat Model}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {34--46}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_5}, doi = {10.1007/978-3-540-39871-4\_5}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mao02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MitchellP02, author = {Chris J. Mitchell and Paulo S. Pagliusi}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Is Entity Authentication Necessary?}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {20--33}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_4}, doi = {10.1007/978-3-540-39871-4\_4}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MitchellP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham02, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Keynote Address}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {2--4}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_2}, doi = {10.1007/978-3-540-39871-4\_2}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Needham02a, author = {Roger M. Needham}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Back to the Beginning}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {242}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_20}, doi = {10.1007/978-3-540-39871-4\_20}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Needham02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/NikanderA02, author = {Pekka Nikander and Jari Arkko}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Delegation of Signalling Rights}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {203--214}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_17}, doi = {10.1007/978-3-540-39871-4\_17}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/NikanderA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/SasakiYI02, author = {Ry{\^{o}}ichi Sasaki and Hiroshi Yoshiura and Shinji Itoh}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Combinatorial Optimization of Countermeasures against Illegal Copying}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {128--144}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_12}, doi = {10.1007/978-3-540-39871-4\_12}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/SasakiYI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/ValdesACDDLSSU02, author = {Alfonso Valdes and Magnus Almgren and Steven Cheung and Yves Deswarte and Bruno Dutertre and Joshua Levy and Hassen Sa{\"{\i}}di and Victoria Stavridou and Tom{\'{a}}s E. Uribe}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {An Architecture for an Adaptive Intrusion-Tolerant Server}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {158--178}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_14}, doi = {10.1007/978-3-540-39871-4\_14}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/ValdesACDDLSSU02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Yahalom02, author = {Raphael Yahalom}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Protocols with Certified-Transfer Servers}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {145--157}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_13}, doi = {10.1007/978-3-540-39871-4\_13}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Yahalom02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YasinsacD02, author = {Alec Yasinsac and James A. Davis}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract)}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {189--202}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_16}, doi = {10.1007/978-3-540-39871-4\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YasinsacD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/YoshiuraMITS02, author = {Hiroshi Yoshiura and Kunihiko Miyazaki and Shinji Itoh and Kazuo Takaragi and Ry{\^{o}}ichi Sasaki}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Legally Authorized and Unauthorized Digital Evidence}, booktitle = {Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2845}, pages = {67--73}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-39871-4\_7}, doi = {10.1007/978-3-540-39871-4\_7}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/YoshiuraMITS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.