Abstract is missing.
- Logic Wins! Jean Goubault-Larrecq. 1-16 [doi]
- Higher-Order Program Verification and Language-Based SecurityNaoki Kobayashi. 17-23 [doi]
- Deducibility ConstraintsSergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune. 24-38 [doi]
- Automated Security Proof for Symmetric Encryption ModesMartin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini. 39-53 [doi]
- Noninterference with Dynamic Security Domains and PoliciesRobert Grabowski, Lennart Beringer. 54-68 [doi]
- A Critique of Some Chaotic-Map and Cellular Automata-Based Stream CiphersMatt Henricksen. 69-78 [doi]
- A Logic for Formal Verification of Quantum ProgramsYoshihiko Kakutani. 79-93 [doi]
- Reducing Equational Theories for the Decision of Static EquivalenceSteve Kremer, Antoine Mercier 0002, Ralf Treinen. 94-108 [doi]
- A Simulation-Based Treatment of Authenticated Message ExchangeKlaas Ole Kürtz, Henning Schnoor, Thomas Wilke. 109-123 [doi]
- Trusted Deployment of Virtual Execution Environment in Grid SystemsDeqing Zou, Jinjiu Long, Hai Jin. 124-136 [doi]
- A Dolev-Yao Model for Zero KnowledgeAnguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh. 137-146 [doi]
- A Special Proxy Signature Scheme with Multi-warrantJianhong Zhang, Hua Chen, Shengnan Gao, Yixian Yang. 147-157 [doi]