Abstract is missing.
- A rewriting-based inference system for the NRL protocol analyzer: grammar generationSantiago Escobar, Catherine Meadows, José Meseguer. 1-12 [doi]
- On fairness in simulatability-based cryptographic systemsMichael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh. 13-22 [doi]
- Towards computationally sound symbolic analysis of key exchange protocolsPrateek Gupta, Vitaly Shmatikov. 23-32 [doi]
- Risk assessment in distributed authorizationPeter C. Chapin, Christian Skalka, Xiaoyang Sean Wang. 33-42 [doi]
- Formal security analysis of basic network-attached storageAvik Chaudhuri, Martín Abadi. 43-52 [doi]
- The framework of selective interleaving functions and the modular assembly kitHeiko Mantel. 53-62 [doi]
- Provable anonymityFlavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Peter van Rossum. 63-72 [doi]
- Email feedback: a policy-based approach to overcoming false positivesSaket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann. 73-82 [doi]