Abstract is missing.
- Putting the Human Back in the ProtocolBruce Christianson. 1-2 [doi]
- Composing Security MetricsMatt Blaze. 3-12 [doi]
- Putting the Human Back in Voting ProtocolsPeter Y. A. Ryan, Thea Peacock. 13-19 [doi]
- Putting the Human Back in Voting ProtocolsPeter Y. A. Ryan. 20-25 [doi]
- Towards a Secure Application-Semantic Aware Policy Enforcement ArchitectureSrijith K. Nair, Bruno Crispo, Andrew S. Tanenbaum. 26-31 [doi]
- Towards a Secure Application-Semantic Aware Policy Enforcement ArchitectureSrijith K. Nair. 32-39 [doi]
- Phish and ChipsBen Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Steven J. Murdoch, Ross J. Anderson, Ronald L. Rivest. 40-48 [doi]
- Phish and ChipsMike Bond. 49-51 [doi]
- Where Next for Formal Methods?James Heather, Kun Wei. 52-58 [doi]
- Where Next for Formal Methods?James Heather. 59-61 [doi]
- Cordial Security Protocol ProgrammingPer Harald Myrvang, Tage Stabell-Kulø. 62-84 [doi]
- Cordial Security Protocol ProgrammingTage Stabell-Kulø. 85-96 [doi]
- Privacy-Sensitive Congestion ChargingAlastair R. Beresford, Jonathan J. Davies, Robert K. Harle. 97-104 [doi]
- Privacy-Sensitive Congestion ChargingAlastair R. Beresford. 105-111 [doi]
- The Value of Location InformationDaniel Cvrcek, Marek Kumpost, Vashek Matyas, George Danezis. 112-121 [doi]
- The Value of Location InformationVashek Matyas. 122-127 [doi]
- Update on PIN or SignatureVashek Matyas. 128-131 [doi]
- Innovations for Grid Security from Trusted ComputingWenbo Mao, Andrew Martin, Hai Jin, Huanguo Zhang. 132-149 [doi]
- Innovations for Grid Security from Trusted ComputingWenbo Mao. 150-152 [doi]
- The Man-in-the-Middle DefenceRoss J. Anderson, Mike Bond. 153-156 [doi]
- The Man-in-the-Middle DefenceRoss J. Anderson. 157-163 [doi]
- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted IntermediariesChris J. Mitchell. 164-170 [doi]
- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted IntermediariesChris J. Mitchell. 171-176 [doi]
- Secure Distributed Human ComputationCraig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine. 177-180 [doi]
- Secure Distributed Human ComputationCraig Gentry. 181-189 [doi]
- Bot, Cyborg and Automated Turing TestJeff Yan. 190-197 [doi]
- Bot, Cyborg and Automated Turing TestJeff Yan. 198-201 [doi]
- A 2-Round Anonymous Veto ProtocolFeng Hao, Piotr Zielinski. 202-211 [doi]
- A 2-Round Anonymous Veto ProtocolFeng Hao. 212-214 [doi]
- How to Speak an Authentication Secret Securely from an EavesdropperLawrence O Gorman, Lynne Shapiro Brotman, Michael J. Sammon. 215-229 [doi]
- How to Speak an Authentication Secret Securely from an EavesdropperLawrence O Gorman. 230-236 [doi]
- Secret Public Key Protocols RevisitedHoon Wei Lim, Kenneth G. Paterson. 237-256 [doi]
- Secret Public Key Protocols RevisitedHoon Wei Lim. 257-260 [doi]
- Vintage Bit CryptographyBruce Christianson, Alex Shafarenko. 261-265 [doi]
- Vintage Bit CryptographyAlex Shafarenko. 266-275 [doi]
- Usability of Security Management: Defining the Permissions of GuestsMatthew Johnson, Frank Stajano. 276-283 [doi]
- Usability of Security Management: Defining the Permissions of GuestsMatthew Johnson. 284-285 [doi]