Book Details

978-3-540-77156-2

Security Protocols

Publication year: 2007

ISBN: 978-3-540-77156-2

Internet Resource: Please Login to download book


Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines of enquiry into interesting problems. Now we bring these proceedings to a wider audience so that you can join in. Our theme this time was “The systemlikes youandwants to be yourfriend.” Security is usually seen as making systems more di?cult for humans to use.


Subject: Computer Science, Bridge, access control, anonymity, authentication, block, stream ciphers, cryptographic protocols, delegation, denial of service, dynamic public keys, grid security, information security, internet security, network security, privacy, security, algorithm analysis and problem complexity