Abstract is missing.
- When Is a Protocol Broken? (Transcript of Discussion)Bruce Christianson. 1-2 [doi]
- Measurable Security through Isotropic ChannelsMicah Sherr, Eric Cronin, Matt Blaze. 3-12 [doi]
- Measurable Security through Isotropic Channels (Transcript of Discussion)Micah Sherr. 13-19 [doi]
- Modeling Partial Attacks with AlloyAmerson Lin, Mike Bond, Jolyon Clulow. 20-33 [doi]
- Modeling Partial Attacks with Alloy (Transcript of Discussion)Amerson Lin. 34-36 [doi]
- Privacy Amplification with Social NetworksShishir Nagaraja. 58-73 [doi]
- Privacy Amplification with Social Networks (Transcript of Discussion)Shishir Nagaraja. 74-80 [doi]
- Reconciling Multiple IPsec and Firewall PoliciesTuomas Aura, Moritz Becker, Michael Roe, Piotr Zielinski. 81-97 [doi]
- Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion)Michael Roe. 98-103 [doi]
- Anchor-Less Secure Session MobilityAlf Zugenmaier, Julien Laganier, Anand R. Prasad, Kristian Slavov. 104-109 [doi]
- Anchor-Less Secure Session Mobility (Transcript of Discussion)Alf Zugenmaier. 110-113 [doi]
- A Model for System-Based Analysis of Voting SystemsThomas Tjøstheim, Thea Peacock, Peter Y. A. Ryan. 114-130 [doi]
- A Model for System-Based Analysis of Voting Systems (Transcript of Discussion)Thomas Tjøstheim. 131-132 [doi]
- Multi-Channel Key Agreement Using Encrypted Public Key ExchangeBruce Christianson, Jun Li. 133-138 [doi]
- Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion)Bruce Christianson. 139-146 [doi]
- On the Security of the EMV Secure Messaging API (Extended Abstract)Ben Adida, Mike Bond, Jolyon Clulow, Amerson Lin, Ross Anderson, Ronald L. Rivest. 147-149 [doi]
- On the Security of the EMV Secure Messaging API (Transcript of Discussion)Jolyon Clulow. 150-151 [doi]
- Distributed Double Spending PreventionJaap-Henk Hoepman. 152-165 [doi]
- Distributed Double Spending Prevention (Transcript of Discussion)Jaap-Henk Hoepman. 166-170 [doi]
- Robbing the Bank with a Theorem Prover - (Abstract)Paul Youn, Ben Adida, Mike Bond, Jolyon Clulow, Jonathan Herzog, Amerson Lin, Ronald L. Rivest, Ross Anderson. 171 [doi]
- Robbing the Bank with a Theorem Prover - (Transcript of Discussion)Jolyon Clulow. 172-177 [doi]
- Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the InternetHaruno Kataoka, Akira Utsumi, Yuki Hirose, Hiroshi Yoshiura. 178-188 [doi]
- Disclosure Control of Natural Language Information to Enable Secure and Enjoyable Communication over the Internet - (Transcript of Discussion)Hiroshi Yoshiura. 189-190 [doi]
- Towards Working with Small Atomic FunctionsAlec Yasinsac, J. Todd McDonald. 191-200 [doi]
- Towards Working with Small Atomic Functions - (Transcript of Discussion)Alec Yasinsac. 201-203 [doi]
- Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software EnvironmentWenbo Mao, Fei Yan, Chuanjiang Yi, Haibo Chen. 204-221 [doi]
- Private Yet Abuse Resistant Open PublishingGeorge Danezis, Ben Laurie. 222-243 [doi]
- Private Yet Abuse Resistant Open Publishing (Transcript of Discussion)George Danezis. 244-255 [doi]
- Instructions to ReviewersBruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe. 256 [doi]