Security Protocols 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers /

Here are the proceedings of the 12th International Workshop on Security P- tocols. We hope that you will enjoy them, and that they will cause you to think at least one heretical thought. Please write or e-mail and share it with us. Our theme this workshop was “Authentic Privacy.” Traditionally we ha...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Christianson, Bruce (Editor), Crispo, Bruno (Editor), Malcolm, James A. (Editor), Roe, Michael (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Series:Lecture Notes in Computer Science, 3957
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Introduction: Authentic Privacy
  • Limits to Anonymity When Using Credentials
  • Limits to Anonymity When Using Credentials (Transcript of Discussion)
  • A Cryptographic Framework for the Controlled Release of Certified Data
  • A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion)
  • One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
  • One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion)
  • Authentication Components: Engineering Experiences and Guidelines
  • Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion)
  • Accountable Privacy
  • Accountable Privacy (Transcript of Discussion)
  • Toward a Broader View of Security Protocols
  • Toward a Broader View of Security Protocols (Transcript of Discussion)
  • Privacy, Control and Internet Mobility
  • Privacy, Control and Internet Mobility (Transcript of Discussion)
  • Controlling Who Tracks Me
  • Controlling Who Tracks Me (Transcript of Discussion)
  • BLIND: A Complete Identity Protection Framework for End-Points
  • BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion)
  • Privacy Is Linking Permission to Purpose
  • Privacy is Linking Permission to Purpose (Transcript of Discussion)
  • Establishing Trust with Privacy
  • Establishing Trust with Privacy (Transcript of Discussion)
  • Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
  • Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion)
  • The Dancing Bear: A New Way of Composing Ciphers
  • The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion)
  • Identity and Location
  • Identity and Location (Transcript of Discussion)
  • Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion)
  • Pseudonymity in the Light of Evidence-Based Trust
  • Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion)
  • Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection
  • Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion)
  • Why Are We Authenticating (Transcript of Discussion)
  • Anonymous Authentication
  • Anonymous Authentication (Transcript of Discussion)
  • Towards a Mechanism for Discretionary Overriding of Access Control
  • Towards a Mechanism for Discretionary Overriding of Access Control (Transcript of Discussion)
  • Last Orders.