Abstract is missing.
- Keynote Address: The Changing EnvironmentRoger M. Needham. 1-5
- Composing Security PropertiesE. Stewart Lee. 6-14
- Auditing against Multiple PoliciesT. Mark A. Lomas. 15-20
- Jikzi: A New Framework for Secure PublishingRoss J. Anderson, Jong-Hyeon Lee. 21-47
- Power and Permission in Security SystemsBabak Sadighi Firozabadi, Marek J. Sergot. 48-59
- Auditing against Impossible AbstractionsBruce Christianson. 60-64
- What Is Authentication?Dieter Gollmann. 65-72
- Relatios Between Secrets: The Yahalom ProtocolLawrence C. Paulson. 73-84
- Modelling Agents Knowledge InductivelyGiampaolo Bella. 85-94
- Time-Lock Puzzle with Examinable Evidence of Unlocking TimeWenbo Mao. 95-102
- Trust Management and Network Layer Security ProtocolsMatt Blaze, John Ioannidis, Angelos D. Keromytis. 103-118
- Issues in Multicast SecurityFrancesco Bergadano, Davide Cavagnino, Bruno Crispo. 119-139
- Performance of ProtocolsMichael Roe. 140-152
- Integrity-Aware PCBC Encryption SchemesVirgil D. Gligor, Pompiliu Donescu. 153-171
- The Resurrecting Duckling: Security Issues for Ad-hoc Wireless NetworksFrank Stajano, Ross J. Anderson. 172-194
- INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber WorldsHiroshi Yoshiura, Seiichi Susaki, Yasuhiko Nagai, Tsukasa Saitoh, Hisashi Toyoshima, Ryoichi Sasaki, Satoru Tezuka. 195-207
- Pictures Can t Lie under OathBruce Christianson, James A. Malcolm, Brian L. Robinson. 208-218
- Bob versus Bob - Good Guy/Bad GuyBob Morris. 219-227
- Who Knows?Allan Ahlberg. 228