The Community for Technology Leaders
Computer Security Foundations Workshop, IEEE (1997)
Rockport, Massachusetts
June 10, 1997 to June 12, 1997
ISSN: 1063-6900
ISBN: 0-8186-7990-5

Preface (PDF)

pp. vii
Session 1: Protocol Checking in CSP: Chair: Roberto Gorrieri
Session 2: Protocol Engineering:Chair: Paul Syverson

Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications (Abstract)

Kin Fai Epsilon Ip , Hong Kong University of Science and Techology
James W. Gray , Hong Kong University of Science and Techology
King-Shan Lui , University of California, Santa Barbara
pp. 45

Strategies against Replay Attacks (Abstract)

Tuomas Aura , Helsinki University of Technology
pp. 59
Session 3: Protocol Verification in Higher Order Logic:Chair: Michael Merritt

Mechanized proofs for a recursive authentication protocol (Abstract)

L.C. Paulson , Comput. Lab., Cambridge Univ., UK
pp. 84
Panel 1: Languages for Formal Specification of Security Protocols: Moderator: Catherine Meadows
Session 4: Distributed System Security:Chair: Li Gong

A Different Look at Secure Distributed Computation (Abstract)

Paul F. Syverson , Naval Research Laboratory
pp. 109
Session 5: Protocol Applications: Chair: Peter Ryan

An Efficient Non-repudiation Protocol (Abstract)

Dieter Gollmann , University of London
Jianying Zhou , National University of Singapore
pp. 126
Session 6: Information Flow:Chair: Stewart Lee
Panel 2: The Computer Security Foundations Workshop: Ten Years on and Ten Years Ahead
Session 7: Security Policies:Chair: John McLean

Security Engineering of Lattice-Based Policies (Abstract)

Ciaran Bryce , GMD - German National Research Center for Information Technology
pp. 195

Index of Authors (PDF)

pp. 209
96 ms
(Ver 3.1 (10032016))