Roger M. Needham Keynote Address: Security Protocols and the Swiss Army Knife (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:1-4 [Conf]
Pekka Nikander Users and Trust in Cyberspace (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:36-42 [Conf]
Peter Landrock Interactive Identification Protocols (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:43-48 [Conf]
Matt Blaze Looking on the Bright Side of Black-Box Cryptography (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:54-61 [Conf]
Lawrence C. Paulson Making Sense of Specifications: The Formalization of SET (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:82-86 [Conf]
Ross J. Anderson The Correctness of Crypto Transaction Sets (Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:128-141 [Conf]
John Ioannidis Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:142-154 [Conf]
Geraint Price Broadening the Scope of Fault Tolerance within Secure Services. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:155-164 [Conf]
Geraint Price Broadening the Scope of Fault Tolerance within Secure Services (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:165-169 [Conf]