Abstract is missing.
- Verifying Confidentiality and Authentication in Kerberos 5Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov. 1-24 [doi]
- A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service AttackDaigo Tomioka, Shin-ya Nishizaki, Ritsuya Ikeda. 25-44 [doi]
- Formal Analysis of the NetBill Electronic Commerce ProtocolKazuhiro Ogata, Kokichi Futatsugi. 45-64 [doi]
- Inferences on Honesty in Compositional Logic for Protocol AnalysisKoji Hasebe, Mitsuhiro Okada. 65-86 [doi]
- A Formal System for Analysis of Cryptographic Encryption and Their Security PropertiesAshraf Bhery, Shigeki Hagihara, Naoki Yonezaki. 87-112 [doi]
- Formal Specification and Verification of Resource Bound Security Using PVSWeijiang Yu, Aloysius K. Mok. 113-133 [doi]
- Java Program Verification at Nijmegen: Developments and PerspectiveBart Jacobs, Erik Poll. 134-153 [doi]
- Decision Procedures for Several Properties of Reactive System SpecificationsNoriaki Yoshiura. 154-173 [doi]
- A Model for Delimited Information ReleaseAndrei Sabelfeld, Andrew C. Myers. 174-191 [doi]
- The Interface Definition Language for Fail-Safe CKohei Suenaga, Oiwa Yutaka, Eijiro Sumii, Akinori Yonezawa. 192-208 [doi]
- Lightweight Wrappers for Interfacing with Binary Code in CCuredMatthew Harren, George C. Necula. 209-225 [doi]
- Detecting Unknown Computer Viruses - A New ApproachAkira Mori. 226-241 [doi]
- Security Policy Descriptions Through the Use of Control Structure of a Target ProgramHirotake Abe, Kazuhiko Kato. 242-261 [doi]
- Securing RPC with a Reference Monitor for System CallsYasushi Shinjo, Yoshinori Nakata, Kozo Itano. 262-280 [doi]
- UML Scrapbook and Realization of Snapshot Programming EnvironmentOsamu Sato, Richard Potter, Mitsuharu Yamamoto, Masami Hagiya. 281-295 [doi]
- Managing Information Technology Security RiskDavid P. Gilliam. 296-317 [doi]
- SEAS: A Secure E-Voting Applet SystemFabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli. 318-329 [doi]
- The Design of a Secure Distributed Devices System Based on ImmunityHiroyuki Nishiyama, Yukinobu Mine, Fumio Mizoguchi. 330-344 [doi]