Abstract is missing.
- Introduction: Brief EncountersBruce Christianson. 1-2 [doi]
- Evolutionary Design of Attack StrategiesJirí Kur, Václav Matyás, Petr Svenda. 3-17 [doi]
- Evolutionary Design of Attack StrategiesPetr Svenda. 18-23 [doi]
- Below the SaltMatt Blaze, Patrick McDaniel. 24-27 [doi]
- Is the Honeymoon over?Matt Blaze. 28-33 [doi]
- Below the SaltMatt Blaze. 34-40 [doi]
- Attacking Each OtherWihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna. 41-47 [doi]
- Attacking Each OtherXavier Chantry. 48-50 [doi]
- Bringing Zero-Knowledge Proofs of Knowledge to PracticeEndre Bangerter, Stefania Barzan, Stephan Krenn, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Joe-Kai Tsay. 51-62 [doi]
- Bringing Zero-Knowledge Proofs of Knowledge to PracticeStephan Krenn. 63-68 [doi]
- Towards a Verified Reference Implementation of a Trusted Platform ModuleAybek Mukhamedov, Andrew D. Gordon, Mark Ryan. 69-81 [doi]
- Towards a Verified Reference Implementation of a Trusted Platform ModuleAybek Mukhamedov. 82-86 [doi]
- The Least Privacy-Damaging Centralised Traffic Data Retention ArchitectureGeorge Danezis. 87-92 [doi]
- The Least Privacy-Damaging Centralised Traffic Data Retention ArchitectureGeorge Danezis. 93-110 [doi]
- Pretty Good DemocracyPeter Y. A. Ryan, Vanessa Teague. 111-130 [doi]
- Pretty Good DemocracyPeter Y. A. Ryan. 131-142 [doi]
- Design and Verification of Anonymous Trust ProtocolsMichael Backes, Matteo Maffei. 143-148 [doi]
- Design and Verification of Anonymous Trust ProtocolsMichael Backes. 149-156 [doi]
- Brief Encounters with a Random Key GraphVirgil D. Gligor, Adrian Perrig, Jun Zhao. 157-161 [doi]
- Brief Encounters with a Random Key GraphVirgil D. Gligor. 162-170 [doi]
- Trust*: Using Local Guarantees to Extend the Reach of TrustStephen Clarke, Bruce Christianson, Hannan Xiao. 171-178 [doi]
- Trust*: Using Local Guarantees to Extend the Reach of TrustBruce Christianson. 179-188 [doi]
- Alice and Bob in LoveJoseph Bonneau. 189-198 [doi]
- Alice and Bob in LoveJoseph Bonneau. 199-212 [doi]
- Why I'm Not an EntropistPaul Syverson. 213-230 [doi]
- Why I'm Not an EntropistPaul Syverson. 231-239 [doi]
- Deriving Ephemeral Authentication Using Channel AxiomsDusko Pavlovic, Catherine Meadows. 240-261 [doi]
- Deriving Ephemeral Authentication Using Channel AxiomsCatherine Meadows. 262-268 [doi]
- A Novel Stateless Authentication ProtocolChris J. Mitchell. 269-274 [doi]
- A Novel Stateless Authentication ProtocolChris J. Mitchell. 275-281 [doi]
- The Trust Economy of Brief EncountersRoss Anderson. 282-284 [doi]
- The Trust Economy of Brief EncountersRoss Anderson. 285-297 [doi]
- Qualitative Analysis for Trust ManagementSimon N. Foley, Vivien M. Rooney. 298-307 [doi]
- Qualitative Analysis for Trust ManagementSimon N. Foley. 308-320 [doi]
- Establishing Distributed Hidden Friendship RelationsSören Preibusch, Alastair R. Beresford. 321-334 [doi]
- Establishing Distributed Hidden Friendship RelationsSören Preibusch. 335-342 [doi]
- Not That Kind of FriendJonathan Anderson, Frank Stajano. 343-349 [doi]
- Not That Kind of FriendJonathan Anderson. 350-364 [doi]
- The Final WordOrson Scott Card. 365 [doi]