Abstract is missing.
- Introduction (Transcript)Bruce Christianson. 1 [doi]
- Keynote AddressRoger M. Needham. 2-4 [doi]
- Weak Authentication: How to Authenticate Unknown Principals without Trusted PartiesJari Arkko, Pekka Nikander. 5-19 [doi]
- Is Entity Authentication Necessary?Chris J. Mitchell, Paulo S. Pagliusi. 20-33 [doi]
- A Structured Operational Modelling of the Dolev-Yao Threat ModelWenbo Mao. 34-46 [doi]
- On Trust Establishment in Mobile Ad-Hoc NetworksLaurent Eschenauer, Virgil D. Gligor, John S. Baras. 47-66 [doi]
- Legally Authorized and Unauthorized Digital EvidenceHiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryoichi Sasaki. 67-73 [doi]
- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document ProcessingBruce Christianson, Jean F. Snook. 74-95 [doi]
- Contractual Access ControlBabak Sadighi Firozabadi, Marek J. Sergot. 96-103 [doi]
- Confidentiality Levels and Deliberate/Indeliberate Protocol AttacksGiampaolo Bella, Stefano Bistarelli. 104-119 [doi]
- Analyzing Delegation PropertiesGiampaolo Bella, Lawrence C. Paulson. 120-127 [doi]
- Combinatorial Optimization of Countermeasures against Illegal CopyingRyôichi Sasaki, Hiroshi Yoshiura, Shinji Itoh. 128-144 [doi]
- Protocols with Certified-Transfer ServersRaphael Yahalom. 145-157 [doi]
- An Architecture for an Adaptive Intrusion-Tolerant ServerAlfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe. 158-178 [doi]
- Supporting Imprecise Delegation in KeyNoteSimon N. Foley. 179-188 [doi]
- Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract)Alec Yasinsac, James A. Davis. 189-202 [doi]
- Delegation of Signalling RightsPekka Nikander, Jari Arkko. 203-214 [doi]
- Mobile IPv6 SecurityTuomas Aura. 215-234 [doi]
- Concluding Discussion: Accounting for ResourcesBruce Christianson. 235-241 [doi]
- Back to the BeginningRoger M. Needham. 242 [doi]