Abstract is missing.
- Keynote Address: Mobile Computing versus Immobile SecurityRoger M. Needham. 1-3 [doi]
- Experiences of Mobile IP SecurityMichael Roe. 4-11 [doi]
- Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 WorldPekka Nikander. 12-21 [doi]
- Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion)Pekka Nikander. 22-26 [doi]
- Efficient, DoS-Resistant, Secure Key Exchange for Internet ProtocolsWilliam Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold. 27-39 [doi]
- Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion)Matt Blaze. 40-48 [doi]
- Thwarting Timing Attacks Using ATM NetworksGeraint Price. 49-58 [doi]
- Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion)Geraint Price. 59-62 [doi]
- Towards a Survivable Security Architecture for Ad-Hoc NetworksTuomas Aura, Silja Mäki. 63-73 [doi]
- Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion)Silja Mäki. 74-79 [doi]
- PIM SecurityDieter Gollmann. 80-81 [doi]
- PIM Security (Transcript of Discussion)Dieter Gollmann. 82-86 [doi]
- Merkle Puzzles Revisited - Finding Matching Elements Between ListsBruce Christianson, David Wheeler. 87-90 [doi]
- Merkle Puzzles Revisited (Transcript of Discussion)Bruce Christianson. 91-94 [doi]
- Encapsulating Rules of Prudent Security EngineeringJan Jürjens. 95-101 [doi]
- Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion)Jan Jürjens. 102-106 [doi]
- A Multi-OS Approach to Trusted Computer SystemsHiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryoichi Sasaki. 107-114 [doi]
- A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion)Hiroshi Yoshiura. 115-118 [doi]
- A Proof of Non-repudiationGiampaolo Bella, Lawrence C. Paulson. 119-125 [doi]
- A Proof of Non-repudiation (Transcript of Discussion)Lawrence C. Paulson. 126-133 [doi]
- Using Authority Certificates to Create Management StructuresBabak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann. 134-145 [doi]
- Using Attribute Certificates for Creating Management Structures (Transcript of Discussion)Babak Sadighi Firozabadi. 146-150 [doi]
- Trust Management and Whether to DelegateSimon N. Foley. 151-157 [doi]
- Trust Management and Whether to Delegate (Transcript of Discussion)Simon N. Foley. 158-165 [doi]
- You Can t Take It with YouT. Mark A. Lomas. 166-169 [doi]
- Protocols Using Keys from Faulty DataDavid Wheeler. 170-179 [doi]
- Protocols Using Keys from Faulty Data (Transcript of Discussion)David Wheeler. 180-187 [doi]
- On the Negotiation of Access Control PoliciesVirgil D. Gligor, Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, John S. Baras. 188-201 [doi]
- Negotiation of Access Control Policies (Transcript of Discussion)Virgil D. Gligor. 202-212 [doi]
- Intrusion-Tolerant Group Management in EnclavesHassen Saïdi. 213-216 [doi]
- Lightweight Authentication in a Mobile Network (Transcript of Discussion)James A. Malcolm. 217-220 [doi]
- Bluetooth Security - Fact or Fiction? (Transcript of Discussion)Peter Drabwell. 221-228 [doi]
- Concluding Discussion: When Does Confidentiality Harm Security?Bruce Christianson. 229-238 [doi]
- The Last WordThucydides. 239 [doi]