Abstract is missing.
- Lifting Reference Monitors from the KernelFred B. Schneider. 1-2 [doi]
- Authenticity Types for Cryptographic ProtocolsAndrew D. Gordon. 3 [doi]
- Verifying the SET Protocol: OverviewLawrence C. Paulson. 4-14 [doi]
- Interacting State Machines: A Stateful Approach to Proving SecurityDavid von Oheimb. 15-32 [doi]
- Automatic Approximation for the Verification of Cryptographic ProtocolsFrédéric Oehl, Gérard Cécé, Olga Kouchnarenko, David Sinclair. 33-48 [doi]
- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol AnalysisColin Boyd, Kapali Viswanathan. 49-61 [doi]
- Critical Critical SystemsSusan Stepney. 62-70 [doi]
- Analysing Security ProtocolsDieter Gollmann. 71-80 [doi]
- Analysis of Probabilistic Contract SigningGethin J. Norman, Vitaly Shmatikov. 81-96 [doi]
- Security Analysis of (Un-) Fair Non-repudiation ProtocolsSigrid Gürgens, Carsten Rudolph. 97-114 [doi]
- Modeling Adversaries in a Logic for Security Protocol AnalysisJoseph Y. Halpern, Riccardo Pucella. 115-132 [doi]
- Secure Self-certified Code for JavaMourad Debbabi, Jules Desharnais, M. Fourati, E. Menif, Frédéric Painchaud, Nadia Tawbi. 133-151 [doi]
- Z Styles for Security Properties and Modern User InterfacesAnthony Hall. 152-166 [doi]
- Cryptographic Challenges: The Past and the FutureBart Preneel. 167-182 [doi]
- TAPS: The Last Few SlidesErnie Cohen. 183-190 [doi]
- Formal Specification for Fast Automatic IDS TrainingAntonio Durante, Roberto Di Pietro, Luigi V. Mancini. 191-204 [doi]
- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection AreaGordon Thomas Rohrmair, Gavin Lowe. 205-220 [doi]
- Revisiting Liveness Properties in the Context of Secure SystemsFelix C. Gärtner. 221-238 [doi]