


default search action
12. Security Protocols Workshop 2004: Cambridge, UK
- Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:

Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers. Lecture Notes in Computer Science 3957, Springer 2006, ISBN 3-540-40925-4 - Bruce Christianson:

Introduction: Authentic Privacy. 1-3 - Andreas Pashalidis, Chris J. Mitchell

:
Limits to Anonymity When Using Credentials. 4-12 - Chris J. Mitchell

:
Limits to Anonymity When Using Credentials (Transcript of Discussion). 13-19 - Endre Bangerter, Jan Camenisch, Anna Lysyanskaya:

A Cryptographic Framework for the Controlled Release of Certified Data. 20-42 - Endre Bangerter:

A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion). 43-50 - Frank Stajano:

One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA. 51-64 - Frank Stajano:

One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion). 65-67 - Pasi Eronen, Jari Arkko:

Authentication Components: Engineering Experiences and Guidelines. 68-77 - Pasi Eronen:

Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion). 78-82 - Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac:

Accountable Privacy. 83-95 - Rebecca N. Wright:

Accountable Privacy (Transcript of Discussion). 96-105 - Matt Blaze:

Toward a Broader View of Security Protocols. 106-120 - Matt Blaze:

Toward a Broader View of Security Protocols (Transcript of Discussion). 121-132 - Tuomas Aura, Alf Zugenmaier:

Privacy, Control and Internet Mobility. 133-145 - Tuomas Aura:

Privacy, Control and Internet Mobility (Transcript of Discussion). 146-150 - Denis Bohm, Mik Lamming, Robert N. Mayo, Jeff Morgan, Kan Zhang:

Controlling Who Tracks Me. 151-154 - Robert N. Mayo:

Controlling Who Tracks Me (Transcript of Discussion). 155-162 - Jukka Ylitalo, Pekka Nikander:

BLIND: A Complete Identity Protection Framework for End-Points. 163-176 - Jukka Ylitalo:

BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion). 177-178 - Fabio Massacci, Nicola Zannone

:
Privacy Is Linking Permission to Purpose. 179-191 - Fabio Massacci:

Privacy is Linking Permission to Purpose (Transcript of Discussion). 192-198 - Laurent Bussard, Refik Molva:

Establishing Trust with Privacy. 199-209 - Laurent Bussard:

Establishing Trust with Privacy (Transcript of Discussion). 210-212 - Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum

:
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System. 213-220 - Bogdan C. Popescu:

Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion). 221-230 - Ross J. Anderson:

The Dancing Bear: A New Way of Composing Ciphers. 231-238 - Ross J. Anderson:

The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion). 239-245 - Dieter Gollmann:

Identity and Location. 246-250 - Dieter Gollmann:

Identity and Location (Transcript of Discussion). 251-255 - Virgil D. Gligor:

Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion). 256-266 - Daniel Cvrcek, Václav Matyás Jr.:

Pseudonymity in the Light of Evidence-Based Trust. 267-274 - Daniel Cvrcek:

Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion). 275 - Mikio Hashimoto, Hiroyoshi Haruki, Takeshi Kawabata:

Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection. 276-286 - Mikio Hashimoto:

Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion). 287-290 - T. Mark A. Lomas:

Why Are We Authenticating (Transcript of Discussion). 291-298 - Partha Das Chowdhury, Bruce Christianson

, James A. Malcolm:
Anonymous Authentication. 299-305 - Bruce Christianson:

Anonymous Authentication (Transcript of Discussion). 306-311 - Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot:

Towards a Mechanism for Discretionary Overriding of Access Control. 312-319 - Erik Rissanen:

Towards a Mechanism for Discretionary Overriding of Access Control (Transcript of Discussion). 320-323 - David Wheeler:

Last Orders. 324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














