- Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad:
Specifying Kerberos 5 cross-realm authentication. WITS 2005: 12-26 - Rachid Echahed, Frédéric Prost:
Handling declared information leakage: extended abstract. WITS 2005: 1-4 - Riccardo Focardi, Matteo Maffei, Francesco Placella:
Inferring authentication tags. WITS 2005: 41-49 - Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr:
Formal prototyping in early stages of protocol design. WITS 2005: 67-80 - Steffen M. Hansen, Jakob Skriver, Hanne Riis Nielson:
Using static analysis to validate the SAML single sign-on protocol. WITS 2005: 27-40 - Bart Jacobs, Wolter Pieters, Martijn Warnier:
Statically checking confidentiality via dynamic labels. WITS 2005: 50-56 - Peter Y. A. Ryan:
A variant of the Chaum voter-verifiable scheme. WITS 2005: 81-88 - Catherine Meadows:
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005. ACM 2005, ISBN 1-58113-980-2 [contents]