Issue 1/2004
Special issue on ESORICS 2002
Content (5 Articles)
Regular contribution
Analysing a stream authentication protocol using model checking
Philippa Hopcroft, Gavin Lowe
Regular contribution
Controlled query evaluation for enforcing confidentiality in complete information systems
Joachim Biskup, Piero Bonatti