Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers, PDF eBook

Security Protocols : 8th International Workshops Cambridge, UK, April 3-5, 2000 Revised Papers PDF

Edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe

Part of the Lecture Notes in Computer Science series

PDF

Please note: eBooks can only be purchased with a UK issued credit card and all our eBooks (ePub and PDF) are DRM protected.

Description

The Cambridge International Workshop on Security Protocols has now run for eight years.

Each year we set a theme, focusing upon a speci?c aspect of security protocols, and invite position papers.

Anybody is welcome to send us a position paper (yes, you are invited) and we don't insist they relate to the current theme in an obvious way.

In our experience, the emergence of the theme as a unifying threadtakesplaceduringthediscussionsattheworkshopitself.Theonlyground rule is that position papers should formulate an approach to some unresolved issues, rather than being a description of a ?nished piece of work.

Whentheparticipantsmeet,wetrytofocusthediscussionsupontheconc- tual issues which emerge.

Security protocols link naturally to many other areas of Computer Science, and deep water can be reached very quickly.

Afterwards, we invite participants to re-draft their position papers in a way which exposes the emergent issues but leaves open the way to their further development.

We also prepare written transcripts of the recorded discussions.

These are edited (in some cases very heavily) to illustrate the way in which the di?erent arguments and perspectives have interacted.

We publish these proceedings as an invitation to the research community.

Although many interesting results ?rst see the light of day in a volume of our proceedings, laying claim to these is not our primary purpose of publication.

Rather, we bring our discussions and insights to a wider audience in order to suggest new lines of investigation which the community may fruitfully pursue.

Information

Information