Abstract is missing.
- Weakly Secret Bit Commitment: Applications to Lotteries and Fair ExchangePaul F. Syverson. 2-13 [doi]
- On the Structure of Delegation NetworksTuomas Aura. 14-26 [doi]
- Two Facets of AuthenticationMartín Abadi. 27-32 [doi]
- Probabilistic Noninterference in a Concurrent LanguageDennis M. Volpano, Geoffrey Smith. 34-43 [doi]
- Partial Model Checking and Theorem Proving for Ensuring Security PropertiesFabio Martinelli. 44-52 [doi]
- Formal Analysis of a Non-Repudiation ProtocolSteve Schneider. 54-65 [doi]
- Honest Ideals on Strand SpacesF. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman. 66-77 [doi]
- Panel Introduction: Varieties of AuthenticationRoberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows. 79-82 [doi]
- Proving Security Protocols with Model Checkers by Data Independence TechniquesA. W. Roscoe. 84-95 [doi]
- Towards a Completeness Result for Model Checking of Security ProtocolsGavin Lowe. 96-105 [doi]
- Efficient Finite-State Analysis for Large Security ProtocolsVitaly Shmatikov, Ulrich Stern. 106-115 [doi]
- Composing Secure Systems that have Emergent PropertiesAris Zakinthinos, E. Stewart Lee. 117-122 [doi]
- Merging Security Policies: Analysis of a Practical ExampleFrédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère. 123-136 [doi]
- Evaluating and Improving Protocol Analysis by Automatic ProofStephen H. Brackin. 138-152 [doi]
- A Simple Logic for Authentication Protocol DesignLevente Buttyán, Sebastian Staamann, Uwe G. Wilhelm. 153-162 [doi]
- Panel Introduction: The Security Impact of Distributed Computing TechnologiesPeter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell. 164-166 [doi]
- A Fair Locking Protocol for Multilevel Secure DatabasesSushil Jajodia, Luigi V. Mancini, Sanjeev Setia. 168-178 [doi]
- Data Level Inference Detection in Database SystemsRaymond W. Yip, Karl N. Levitt. 179-189 [doi]
- Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable StrategiesJia-Ling Lin, Xiaoyang Sean Wang, Sushil Jajodia. 190-201 [doi]