Roger M. Needham Keynote Address: Mobile Computing versus Immobile Security. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:1-3 [Conf]
Pekka Nikander Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:12-21 [Conf]
Pekka Nikander Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:22-26 [Conf]
Silja Mäki Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:74-79 [Conf]
Simon N. Foley Trust Management and Whether to Delegate (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:158-165 [Conf]
David Wheeler Protocols Using Keys from Faulty Data (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:180-187 [Conf]
Virgil D. Gligor Negotiation of Access Control Policies (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:202-212 [Conf]
Hassen Saïdi Intrusion-Tolerant Group Management in Enclaves. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:213-216 [Conf]
James A. Malcolm Lightweight Authentication in a Mobile Network (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:217-220 [Conf]
Peter Drabwell Bluetooth Security - Fact or Fiction? (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:221-228 [Conf]
Bruce Christianson Concluding Discussion: When Does Confidentiality Harm Security? [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:229-238 [Conf]