Search dblp for Publications

export results for "toc:db/conf/spw/spw2002.bht:"

 download as .bib file

@proceedings{DBLP:conf/spw/2002,
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b94819},
  doi          = {10.1007/B94819},
  isbn         = {3-540-20830-5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ArkkoN02,
  author       = {Jari Arkko and
                  Pekka Nikander},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Weak Authentication: How to Authenticate Unknown Principals without
                  Trusted Parties},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {5--19},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_3},
  doi          = {10.1007/978-3-540-39871-4\_3},
  timestamp    = {Sat, 05 Sep 2020 18:04:37 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ArkkoN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Aura02,
  author       = {Tuomas Aura},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Mobile IPv6 Security},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {215--234},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_18},
  doi          = {10.1007/978-3-540-39871-4\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Aura02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaB02,
  author       = {Giampaolo Bella and
                  Stefano Bistarelli},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_10},
  doi          = {10.1007/978-3-540-39871-4\_10},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BellaP02,
  author       = {Giampaolo Bella and
                  Lawrence C. Paulson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Analyzing Delegation Properties},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {120--127},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_11},
  doi          = {10.1007/978-3-540-39871-4\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BellaP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson02,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Introduction (Transcript)},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {1},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_1},
  doi          = {10.1007/978-3-540-39871-4\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Christianson02a,
  author       = {Bruce Christianson},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Concluding Discussion: Accounting for Resources},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {235--241},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_19},
  doi          = {10.1007/978-3-540-39871-4\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Christianson02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ChristiansonS02,
  author       = {Bruce Christianson and
                  Jean Fiona Snook},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Shrink-Wrapped Optimism: The {DODA} Approach to Distributed Document
                  Processing},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {74--95},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_8},
  doi          = {10.1007/978-3-540-39871-4\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ChristiansonS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/EschenauerGB02,
  author       = {Laurent Eschenauer and
                  Virgil D. Gligor and
                  John S. Baras},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {On Trust Establishment in Mobile Ad-Hoc Networks},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {47--66},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_6},
  doi          = {10.1007/978-3-540-39871-4\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/EschenauerGB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FirozabadiS02,
  author       = {Babak Sadighi Firozabadi and
                  Marek J. Sergot},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Contractual Access Control},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {96--103},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_9},
  doi          = {10.1007/978-3-540-39871-4\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FirozabadiS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Foley02,
  author       = {Simon N. Foley},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Supporting Imprecise Delegation in KeyNote},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {179--188},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_15},
  doi          = {10.1007/978-3-540-39871-4\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Foley02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mao02,
  author       = {Wenbo Mao},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {A Structured Operational Modelling of the Dolev-Yao Threat Model},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {34--46},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_5},
  doi          = {10.1007/978-3-540-39871-4\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mao02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MitchellP02,
  author       = {Chris J. Mitchell and
                  Paulo S. Pagliusi},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Is Entity Authentication Necessary?},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {20--33},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_4},
  doi          = {10.1007/978-3-540-39871-4\_4},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MitchellP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham02,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Keynote Address},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {2--4},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_2},
  doi          = {10.1007/978-3-540-39871-4\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Needham02a,
  author       = {Roger M. Needham},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Back to the Beginning},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {242},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_20},
  doi          = {10.1007/978-3-540-39871-4\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Needham02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/NikanderA02,
  author       = {Pekka Nikander and
                  Jari Arkko},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Delegation of Signalling Rights},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {203--214},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_17},
  doi          = {10.1007/978-3-540-39871-4\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/NikanderA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/SasakiYI02,
  author       = {Ry{\^{o}}ichi Sasaki and
                  Hiroshi Yoshiura and
                  Shinji Itoh},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Combinatorial Optimization of Countermeasures against Illegal Copying},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {128--144},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_12},
  doi          = {10.1007/978-3-540-39871-4\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/SasakiYI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/ValdesACDDLSSU02,
  author       = {Alfonso Valdes and
                  Magnus Almgren and
                  Steven Cheung and
                  Yves Deswarte and
                  Bruno Dutertre and
                  Joshua Levy and
                  Hassen Sa{\"{\i}}di and
                  Victoria Stavridou and
                  Tom{\'{a}}s E. Uribe},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {An Architecture for an Adaptive Intrusion-Tolerant Server},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {158--178},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_14},
  doi          = {10.1007/978-3-540-39871-4\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/ValdesACDDLSSU02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Yahalom02,
  author       = {Raphael Yahalom},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Protocols with Certified-Transfer Servers},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {145--157},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_13},
  doi          = {10.1007/978-3-540-39871-4\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Yahalom02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YasinsacD02,
  author       = {Alec Yasinsac and
                  James A. Davis},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Modeling Protocols for Secure Group Communications in Ad Hoc Networks:
                  (Extended Abstract)},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {189--202},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_16},
  doi          = {10.1007/978-3-540-39871-4\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YasinsacD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/YoshiuraMITS02,
  author       = {Hiroshi Yoshiura and
                  Kunihiko Miyazaki and
                  Shinji Itoh and
                  Kazuo Takaragi and
                  Ry{\^{o}}ichi Sasaki},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Legally Authorized and Unauthorized Digital Evidence},
  booktitle    = {Security Protocols, 10th International Workshop, Cambridge, UK, April
                  17-19, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2845},
  pages        = {67--73},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-39871-4\_7},
  doi          = {10.1007/978-3-540-39871-4\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/YoshiuraMITS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics