Abstract is missing.
- Towards Security and Privacy for Pervasive ComputingRoy H. Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas. 1-15 [doi]
- Security for Whom?: The Shifting Security Assumptions of Pervasive ComputingFrank Stajano. 16-27 [doi]
- Active Authentication for Pervasive Computing EnvironmentsKenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda. 28-41 [doi]
- A Survey of Peer-to-Peer Security IssuesDan S. Wallach. 42-57 [doi]
- Autonomous Nodes and Distributed MechanismsJohn C. Mitchell, Vanessa Teague. 58-83 [doi]
- Privacy in Sensor Webs and Distributed Information SystemsJ. D. Tygar. 84-95 [doi]
- Negotiated Privacy: (Extended Abstract)Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov. 96-111 [doi]
- SoftwarePot: An Encapsulated Transferable File System for Secure Software CirculationKazuhiko Kato, Yoshihiro Oyama. 112-132 [doi]
- Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure: Progress ReportOiwa Yutaka, Tatsurou Sekiguchi, Eijiro Sumii, Akinori Yonezawa. 133-153 [doi]
- Types and Effects for Non-interfering Program MonitorsLujo Bauer, Jarred Ligatti, David Walker. 154-171 [doi]
- Flexible and Efficient Sandboxing Based on Fine-Grained Protection DomainsTakahiro Shinagawa, Kenji Kono, Takashi Masuda. 172-184 [doi]
- Enforcing Java Run-Time Properties Using Bytecode RewritingAlgis Rudys, Dan S. Wallach. 185-200 [doi]
- AnZenMail: A Secure and Certified E-mail SystemEtsuya Shibayama, Shigeki Hagihara, Naoki Kobayashi, Shin-ya Nishizaki, Kenjiro Taura, Takuo Watanabe. 201-216 [doi]
- Formalization and Verification of a Mail Server in CoqReynald Affeldt, Naoki Kobayashi. 217-233 [doi]
- Design and Implementation of Security System Based on Immune SystemHiroyuki Nishiyama, Fumio Mizoguchi. 234-248 [doi]
- Design and Implementation of Access Control System for Smart Office EnvironmentWataru Yamazaki, Fumio Mizoguchi. 249-262 [doi]
- Typing One-to-One and One-to-Many Correspondences in Security ProtocolsAndrew D. Gordon, Alan Jeffrey. 263-282 [doi]
- Proof-Carrying Code with Untrusted Proof RulesGeorge C. Necula, Robert R. Schneck. 283-298 [doi]
- Verification of Authentication Protocols Based on the Binding RelationMasami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito. 299-316 [doi]
- Hiding Names: Private Authentication in the Applied Pi CalculusCédric Fournet, Martín Abadi. 317-338 [doi]
- Environmental Requirements for Authentication ProtocolsRan Canetti, Catherine Meadows, Paul F. Syverson. 339-355 [doi]
- A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol AnalysisIliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov. 356-383 [doi]
- Data Access Specification and the Most Powerful Symbolic Attacker in MSRIliano Cervesato. 384-416 [doi]
- A Logical Verification Method for Security Protocols Based on Linear Logic and BAN LogicKoji Hasebe, Mitsuhiro Okada. 417-440 [doi]
- Formal Analysis of the ::::i::::KP Electronic Payment ProtocolsKoji Hasebe, Mitsuhiro Okada. 441-460 [doi]
- CafeOBJ as a Tool for Behavioral System VerificationAkira Mori, Kokichi Futatsugi. 461-470 [doi]