Keynote Address: Mobile Computing versus Immobile Security / Roger Needham |
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe |
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander |
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion) |
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / William Aiello ; Steven M. Bellovin ; Matt Blaze ; Ran Canetti ; John Ioannidis ; Angelos D. Keromytis ; Omer Reingold |
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion) |
Thwarting Timing Attacks Using ATM Networks / Geraint Price |
Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion) |
Towards a Survivable Security Architecture for Ad-Hoc Networks / Tuomas Aura ; Silja Mäki |
Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion) |
PIM Security / Dieter Gollmann |
PIM Security (Transcript of Discussion) |
Merkle Puzzles Revisited - Finding Matching Elements between Lists / Bruce Christianson ; David Wheeler |
Merkle Puzzles Revisited (Transcript of Discussion) |
Encapsulating Rules of Prudent Security Engineering (Position Paper) / Jan Jürjens |
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion) |
A Multi-OS Approach to Trusted Computer Systems / Hiroshi Yoshiura ; Kunihiko Miyazaki ; Shinji Itoh ; Kazuo Takaragi ; Ryoichi Sasaki |
A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion) |
A Proof of Non-repudiation / Giampaolo Bella ; Lawrence C. Paulson |
A Proof of Non-repudiation (Transcript of Discussion) / Larry Paulson |
Using Authority Certificates to Create Management Structures / Babak Sadighi Firozabadi ; Marek Sergot ; Olav Bandmann |
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion) |
Trust Management and Whether to Delegate / Simon N. Foley |
Trust Management and Whether to Delegate (Transcript of Discussion) |
You Can't Take It with You (Transcript of Discussion) / Mark Lomas |
Protocols Using Keys from Faulty Data |
Protocols Using Keys from Faulty Data (Transcript of Discussion) |
On the Negotiation of Access Control Policies / Virgil D. Gligor ; Himanshu Khurana ; Radostina K. Koleva ; Vijay G. Bharadwaj ; John S. Baras |
Negotiation of Access Control Policies (Transcript of Discussion) |
Intrusion-Tolerant Group Management in Enclaves (Transcript of Discussion) / Hassen Sa¿idi |
Lightweight Authentication in a Mobile Network (Transcript of Discussion) / James Malcolm |
Bluetooth Security - Fact or Fiction? (Transcript of Discussion) / Peter Drabwell |
Concluding Discussion When Does Confidentiality Harm Security? / Chair: Bruce Christianson |
The Last Word / Thucydides |
Author Index |
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham |
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe |
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander |
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion) |
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / William Aiello ; Steven M. Bellovin ; Matt Blaze ; Ran Canetti ; John Ioannidis ; Angelos D. Keromytis ; Omer Reingold |
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion) |