Abstract is missing.
- Computational Probabilistic Non-interferenceMichael Backes, Birgit Pfitzmann. 1-23 [doi]
- Bit-Slice Auction CircuitKaoru Kurosawa, Wakaha Ogata. 24-38 [doi]
- Confidentiality Policies and Their Enforcement for Controlled Query EvaluationJoachim Biskup, Piero A. Bonatti. 39-54 [doi]
- Cardinality-Based Inference Control in Sum-Only Data CubesLingyu Wang, Duminda Wijesekera, Sushil Jajodia. 55-71 [doi]
- Outbound Authentication for Programmable Secure CoprocessorsSean W. Smith. 72-89 [doi]
- Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking DefenseMarcin Gomulkiewicz, Miroslaw Kutylowski. 90-103 [doi]
- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and RecommendationsGiles Hogben, Tom Jackson, Marc Wilikens. 104-125 [doi]
- Authentication for Distributed Web CachesJames Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari. 126-145 [doi]
- Analysing a Stream Authentication Protocol Using Model CheckingPhilippa J. Broadfoot, Gavin Lowe. 146-161 [doi]
- Equal To The Task?James Heather, Steve Schneider. 162-177 [doi]
- TINMAN: A Resource Bound Security Checking System for Mobile CodeAloysius K. Mok, Weijiang Yu. 178-193 [doi]
- Confidentiality-Preserving Refinement is Compositional - SometimesThomas Santen, Maritta Heisel, Andreas Pfitzmann. 194-211 [doi]
- Formal Security Analysis with Interacting State MachinesDavid von Oheimb, Volkmar Lotz. 212-228 [doi]
- Decidability of Safety in Graph-Based Models for Access ControlManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce. 229-243 [doi]
- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping StonesXinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu. 244-263 [doi]
- Learning Fingerprints for a Database Intrusion Detection SystemSin Yeung Lee, Wai Lup Low, Pei Yuen Wong. 264-280 [doi]