18. CSFW 2005: Aix-en-Provence, France

Introduction

Session 1: Information Flow and Security Goals

Session 2: Logic and Knowledge for Protocols

Session 3: Protocol Case Studies

Session 5: Protocol Verification Techniques

Session 6: Computational and Formal Models

Session 7: Access Control and Languages

Session 9: Declassification

Session 10: Availability and Denial of Service

maintained by Schloss Dagstuhl LZI at University of Trier