Abstract is missing.
- Where Have All the Protocols Gone?Bruce Christianson. 1-2 [doi]
- A Protocol s Life After Attacks...Giampaolo Bella, Stefano Bistarelli, Fabio Massacci. 3-10 [doi]
- A Protocol s Life After Attacks... (Discussion)Giampaolo Bella. 11-18 [doi]
- Towards Flexible Credential Negotiation ProtocolsPiero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati. 19-23 [doi]
- Towards Flexible Credential Negotiation Protocols (Discussion)Pierangela Samarati. 24-27 [doi]
- Man-in-the-Middle in Tunnelled Authentication ProtocolsN. Asokan, Valtteri Niemi, Kaisa Nyberg. 28-41 [doi]
- Man-in-the-Middle in Tunnelled Authentication Protocols (Discussion)N. Asokan. 42-48 [doi]
- Towards a Framework for Autonomic Security ProtocolsSimon N. Foley, Hongbin Zhou. 49-54 [doi]
- Towards a Framework for Autonomic Security Protocols (Discussion)Simon N. Foley. 55-62 [doi]
- Client v. Server Side Protocols, Interfaces and StorageGeraint Price. 63-73 [doi]
- Client v. Server Side Protocols, Interfaces and Storage (Discussion)Geraint Price. 74-79 [doi]
- Guaranteeing Access in Spite of Distributed Service-Flooding AttacksVirgil D. Gligor. 80-96 [doi]
- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks (Discussion)Virgil D. Gligor. 97-105 [doi]
- Protocol CodesignHassen Saïdi, Victoria Stavridou, Bruno Dutertre. 106-113 [doi]
- Protocol Codesign (Discussion)Victoria Stavridou. 114-118 [doi]
- Enforcing Security Policies for Distributed Objects ApplicationsBogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman. 119-130 [doi]
- Enforcing Security Policies for Distributed Objects Applications (Discussion)Bogdan C. Popescu. 131-133 [doi]
- Regular SPKIMads Dam. 134-150 [doi]
- Regular SPKI (Discussion)Mads Dam. 151-152 [doi]
- Federated Identity-Management ProtocolsBirgit Pfitzmann, Michael Waidner. 153-174 [doi]
- Federated Identity-Management Protocols (Discussion)Birgit Pfitzmann. 175-177 [doi]
- Enforcing the UnenforceablePeter Y. A. Ryan. 178-182 [doi]
- Is the Verification Problem for Cryptographic Protocols Solved?Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson. 183-189 [doi]
- Secure Sessions from Weak SecretsBruce Christianson, Michael Roe, David Wheeler. 190-205 [doi]
- Secure Sessions from Weak Secrets (Discussion)Bruce Christianson. 206-212 [doi]
- Panel Session: Is Protocol Modelling Finished?Michael Roe. 213-217 [doi]
- WAR: Wireless Anonymous RoutingMatt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Aviel D. Rubin. 218-232 [doi]
- WAR: Wireless Anonymous Routing (Discussion)Matt Blaze. 233-240 [doi]
- Limitations of IPsec Policy MechanismsJari Arkko, Pekka Nikander. 241-251 [doi]
- Limitations of IPsec Policy Mechanisms (Discussion)Jari Arkko. 252-254 [doi]
- Deniable Authenticated Key Establishment for Internet ProtocolsColin Boyd, Wenbo Mao, Kenneth G. Paterson. 255-271 [doi]
- Deniable Authenticated Key Establishment for Internet Protocols (Discussion)Wenbo Mao. 272-273 [doi]
- Protocols for Supporting a Public Key Infrastructure in Ad Hoc NetworksMike Burmester, Alec Yasinsac. 274-282 [doi]
- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion)Alec Yasinsac. 283-287 [doi]
- What We Can Learn from API SecurityRoss J. Anderson. 288-300 [doi]
- Addressing New Challenges by Building Security Protocols Around GraphsKamil Kulesza, Zbigniew Kotulski. 301-306 [doi]
- From Security Protocols to Systems SecurityBrian Monahan. 307-322 [doi]
- From Security Protocols to Systems Security (Discussion)Brian Monahan. 323-323 [doi]
- Biometrics to Enhance Smartcard SecurityGiampaolo Bella, Stefano Bistarelli, Fabio Martinelli. 324-332 [doi]
- Biometrics to Enhance Smartcard Security (Discussion)Fabio Martinelli. 333-335 [doi]
- Blind Publication: A Copyright Library without Publication or TrustJames A. Malcolm. 336-340 [doi]
- Blind Publication: A Copyright Library Without Publication or Trust (Discussion)James A. Malcolm. 341-349 [doi]