Abstract is missing.
- Local Names in SPKI/SDSINinghui Li. 2-15 [doi]
- Reasoning about Trust and Insurance in a Public Key InfrastructureJonathan K. Millen, Rebecca N. Wright. 16-22 [doi]
- Protocol Independence through Disjoint EncryptionJoshua D. Guttman, F. Javier Thayer. 24-34 [doi]
- Relating Strands and Multiset Rewriting for Security Protocol AnalysisIliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov. 35-51 [doi]
- Optimizing Protocol Rewrite Rules of CIL SpecificationsGrit Denker, Jonathan K. Millen, Antonio Grau, Juliana Küster Filipe. 52-62 [doi]
- Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement ProtocolsAdrian Perrig, D. Song. 64-76 [doi]
- C3PO: A Tool for Automatic Sound Cryptographic Protocol AnalysisAnthony H. Dekker. 77-87 [doi]
- An Executable Specification Language for Planning Attacks to Security ProtocolsLuigia Carlucci Aiello, Fabio Massacci. 88-102 [doi]
- Foundations for Intrusion Detection?Teresa F. Lunt. 104-106 [doi]
- Analyzing Single-Server Network InhibitionTuomas Aura, Matt Bishop, Dean Sniegowski. 108-117 [doi]
- Reasoning about Secrecy for Active NetworksPankaj Kakkar, Carl A. Gunter, Martín Abadi. 118-129 [doi]
- Towards Automatic Verification of Authentication Protocols on an Unbounded NetworkJames Heather, Steve Schneider. 132-143 [doi]
- TAPS: A First-Order Verifier for Cryptographic ProtocolsErnie Cohen. 144-158 [doi]
- Invariant Generation Techniques in Cryptographic Protocol AnalysisCatherine Meadows. 159-167 [doi]
- Information Flow Analysis in a Discrete-Time Process AlgebraRiccardo Focardi, Roberto Gorrieri, Fabio Martinelli. 170-184 [doi]
- Possibilistic Definitions of Security - An Assembly KitHeiko Mantel. 185-199 [doi]
- Probabilistic Noninterference for Multi-Threaded ProgramsAndrei Sabelfeld, David Sands. 200-214 [doi]
- An Operational Semantics of Java 2 Access ControlGünter Karjoth. 224-232 [doi]
- Confidentiality for Mobile Code: The Case of a Simple Payment ProtocolMads Dam, Pablo Giambiagi. 233-244 [doi]
- Secure Introduction of One-Way FunctionsDennis M. Volpano. 246-254 [doi]
- How to Prevent Type Flaw Attacks on Security ProtocolsJames Heather, Gavin Lowe, Steve Schneider. 255-268 [doi]
- Secure Composition of Untrusted Code: Wrappers and Causality TypesPeter Sewell, Jan Vitek. 269-284 [doi]