Security Protocols 15th International Workshop, Brno, Czech Republic
This book constitutes the thoroughly refereed post-proceedings of the 15th International Workshop on Security Protocols, held in Brno, Czech Republic, in April 2007. The 15 revised full papers presented together with edited transcriptions of some of the d
- PDF / 3,576,546 Bytes
- 266 Pages / 429.725 x 659.895 pts Page_size
- 78 Downloads / 160 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany
5964
Bruce Christianson Bruno Crispo James A. Malcolm Michael Roe (Eds.)
Security Protocols 15th International Workshop Brno, Czech Republic, April 18-20, 2007 Revised Selected Papers
13
Volume Editors Bruce Christianson University of Hertfordshire, Computer Science Department Hatfield, AL10 9AB, UK E-mail: [email protected] Bruno Crispo Dipartimento di Ingegneria e Scienza dell’Informazione Via Sommarive 14, 38123 Povo (TN), Italy E-mail: [email protected] James A. Malcolm University of Hertfordshire, Computer Science Department Hatfield, AL10 9AB, UK E-mail: [email protected] Michael Roe Microsoft Research Ltd., Roger Needham Building 7 JJ Thomson Avenue, Cambridge, CB3 0FB, UK E-mail: [email protected]
Library of Congress Control Number: Applied for CR Subject Classification (1998): C.2, K.6.5, E.3, D.4.6, H.4, H.3 LNCS Sublibrary: SL 4 – Security and Cryptology ISSN ISBN-10 ISBN-13
0302-9743 3-642-17772-7 Springer Berlin Heidelberg New York 978-3-642-17772-9 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com © Springer-Verlag Berlin Heidelberg 2010 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper 06/3180
Preface
Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.” The theme of our deliberations this time was: “When is a Protocol Broken?”. We expect network protocols to d
Data Loading...