Keynote Talk |
Lifting Reference Monitors from the Kernel / F.B. Schneider |
Invited Talks I |
Authenticity Types for Cryptographic Protocols / A. Gordon |
Verifying the SET Protocol: Overview / L.C. Paulson |
Protocol Verification |
Interacting State Machines: A Stateful Approach to Proving Security / D. von Oheimb |
Automatic Approximation for the Verification of Cryptographic Protocols / F. Oehl ; G. Cece ; O. Kouchnarenko ; D. Sinclair |
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis / C. Boyd ; K. Viswanathan |
Invited Talks II |
Critical Critical Systems / S. Stepney |
Analysing Security Protocols / D. Gollmann |
Analysis of Protocols |
Analysis of Probabilistic Contract Signing / G. Norman ; V. Shmatikov |
Security Analysis of (Un-) Fair Non-repudiation Protocols / S. Gurgens ; C. Rudolph |
Modeling Adversaries in a Logic for Security Protocol Analysis / J.Y. Halpern ; R. Pucella |
Security Modelling and Reasonning |
Secure Self-certified Code for Java / M. Debbabi ; J. Desharnais ; M. Fourati ; E. Menif ; F. Painchaud ; N. Tawbi |
Z Styles for Security Properties and Modern User Interfaces / A. Hall |
Invited Talks III |
Cryptographic Challenges: The Past and the Future / B. Preneel |
TAPS: The Last Few Slides / E. Cohen |
Intrusion Detection Systems and Liveness |
Formal Specification for Fast Automatic IDS Training / A. Durante ; R. Di Pietro ; L.V. Mancini |
Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area / G.T. Rohrmair ; G. Lowe |
Revisiting Liveness Properties in the Context of Secure Systems / F.C. Gartner |
Author Index |
Keynote Talk |
Lifting Reference Monitors from the Kernel / F.B. Schneider |
Invited Talks I |
Authenticity Types for Cryptographic Protocols / A. Gordon |
Verifying the SET Protocol: Overview / L.C. Paulson |
Protocol Verification |