Enhancing Privacy with Shared Pseudo Random Sequences
As a number of times before, I’m trying to make a very simple presentation, to present a very simple idea. To me, this one looks almost too simple; maybe somebody else has already made this observation, and if so I’d like to hear about that. I’m diverging
- PDF / 5,082,462 Bytes
- 354 Pages / 430 x 659.996 pts Page_size
- 76 Downloads / 188 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
4631
Bruce Christianson Bruno Crispo James A. Malcolm Michael Roe (Eds.)
Security Protocols 13th International Workshop Cambridge, UK, April 20-22, 2005 Revised Selected Papers
13
Volume Editors Bruce Christianson University of Hertfordshire Computer Science Department Hatfield AL10 9AB, UK E-mail: [email protected] Bruno Crispo Vrije Universiteit Department of Computer Science 1081 HV Amsterdam, The Netherlands E-mail: [email protected] James A. Malcolm University of Hertfordshire Computer Science Department Hatfield AL10 9AB, UK E-mail: [email protected] Michael Roe Microsoft Research Ltd. Cambridge CB3 0FB, UK E-mail: [email protected]
Library of Congress Control Number: 2007940529 CR Subject Classification (1998): E.3, F.2.1-2, C.2, K.6.5, J.1, K.4.1, D.4.6 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISBN-10 ISBN-13
0302-9743 3-540-77155-7 Springer Berlin Heidelberg New York 978-3-540-77155-5 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2007 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12201679 06/3180 543210
Preface
Welcome to the Proceedings of the 13th International Security Protocols Workshop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were circulated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines
Data Loading...