Abstract is missing.
- Foreword
- Preface
- Open Questions, Talk Abstracts, and Summary of DiscussionsJoan Feigenbaum, Michael Merritt. 1-46
- Formal Definitions for Secure Distributed ProtocolsDonald Beaver. 47-64
- Perfect Privacy For Two-Party ProtocolsDonald Beaver. 65-78
- On the Structure of Secret Key Exchange ProtocolsMihir Bellare, Lenore Cowen, Shafi Goldwasser. 79-92
- Privacy-Enhanced Electronic MailMatt Bishop. 93-106
- Program Result Checking against Adaptive Programs and in Cryptographic SettingsManuel Blum, Michael Luby, Ronitt Rubinfeld. 107-118
- The Scope of a Logic of AuthenticationMichael Burrows, MartÃn Abadi, Roger M. Needham. 119-126
- Secure Policy Enforcement in InternetworksDeborah Estrin, Gene Tsudik. 127-154
- On Expected Polynomial Time Simulation of Zero Knowledge ProtocolsUriel Feige, Adi Shamir. 155-160
- Cryptographic Protection of Databases and SoftwareJoan Feigenbaum, Mark Y. Liberman, Rebecca N. Wright. 161-172
- Secret Bit Transmission Using a Random Deal of CardsMichael J. Fischer, Michael S. Paterson, Charles Rackoff. 173-182
- Security against Replay Chosen-Ciphertext AttackZvi Galil, Stuart Haber, Moti Yung. 183-190
- New Directions In TestingRichard J. Lipton. 191-202
- Towards a Theory of Cryptographic Systems: A Critique of Crypto-ComplexityMichael Merritt. 203-212
- Feeback in Discrete CommunicationAlon Orlitsky. 213-228
- On Necessary Conditions for Secure Distributed ComputationRafail Ostrovsky, Moti Yung. 229-234
- Secure IX NetworkJim Reeds. 235-244
- Reasoning about Cryptographic ProtocolsMarie-Jeanne Toussaint, Pierre Wolper. 245