Security Protocols 11th International Workshop, Cambridge, UK, April

Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport lay

  • PDF / 4,570,663 Bytes
  • 360 Pages / 430 x 660 pts Page_size
  • 67 Downloads / 168 Views

DOWNLOAD

REPORT


Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos New York University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

3364

Bruce Christianson Bruno Crispo James A. Malcolm Michael Roe (Eds.)

Security Protocols 11th International Workshop Cambridge, UK, April 2-4, 2003 Revised Selected Papers

13

Volume Editors Bruce Christianson James A. Malcolm University of Hertfordshire Computer Science Department Hatfield AL10 9AB, UK E-mail: {b.christianson,J.A.Malcolm}@herts.ac.uk Bruno Crispo Vrije Universiteit De Boelelaan 1081, 1081 HV Amsterdam, The Netherlands E-mail: [email protected] Michael Roe Microsoft Research Ltd 7 J.J. Thomson Avenue, Cambridge CB3 0FB, UK E-mail: [email protected]

Library of Congress Control Number: 2005931713 CR Subject Classification (1998): E.3, F.2.1-2, C.2, K.6.5, J.1, K.4.1, D.4.6 ISSN ISBN-10 ISBN-13

0302-9743 3-540-28389-7 Springer Berlin Heidelberg New York 978-3-540-28389-8 Springer Berlin Heidelberg New York

This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com © Springer-Verlag Berlin Heidelberg 2005 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 11542322 06/3142 543210

Preface

Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletel