| Problems, Methods and Tools of Security Engineering           | 
                                                                                        
           | 
              
          
                                                                                        | Protocol Derivation Assistant           | 
                                                                                        
           | 
              
          
                                                                                        | Design Patterns in Protocol Derivation           | 
                                                                                        
           | 
              
          
                                                                                        | Towards Evolving Specs of Security Protocols           | 
                                                                                        
           | 
              
          
                                                                                        | Towards a Science of Trust           | 
                                                                                        
           | 
              
          
                                                                                        | Gaming Security by Obscurity           | 
                                                                                        
           | 
              
          
                                                                                        | Towards a Science of Trust           | 
                                                                                        
           | 
              
          
                                                                                        | 4 Statements about Science & Security           | 
                                                                                        
           | 
              
          
                                                                                        | 3 Dubious Concepts in Science of Security           | 
                                                                                        
           | 
              
          
                                                                                        | Inductive Inference of Security           | 
                                                                                        
           |