Abstract is missing.
- Electronic payment technologiesYair Frankel. [doi]
- Network security and IPsec (tutorial)John Ioannidis, Angelos D. Keromytis. [doi]
- Evaluating certificate status information mechanismsJohn Iliadis, Diomidis Spinellis, Dimitris Gritzalis, Bart Preneel, Sokratis K. Katsikas. 1-8 [doi]
- Accountable certificate management using undeniable attestationsAhto Buldas, Peeter Laud, Helger Lipmaa. 9-17 [doi]
- Efficient fault-tolerant certificate revocationRebecca N. Wright, Patrick Lincoln, Jonathan K. Millen. 19-24 [doi]
- Timing attacks on Web privacyEdward W. Felten, Michael A. Schneider. 25-32 [doi]
- A protocol for anonymous communication over the InternetClay Shields, Brian Neil Levine. 33-42 [doi]
- A secure execution framework for JavaManfred Hauswirth, Clemens Kerer, Roman Kurmanowytsch. 43-52 [doi]
- User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocolPino Persiano, Ivan Visconti. 53-62 [doi]
- Distribution chain securityGlenn Durfee, Matthew K. Franklin. 63-70 [doi]
- Threshold-based identity recovery for privacy enhanced applicationsJoachim Biskup, Ulrich Flegel. 71-79 [doi]
- Reducing the round complexity of a sealed-bid auction protocol with an off-line TTPYuji Watanabe, Hideki Imai. 80-86 [doi]
- XML document security based on provisional authorizationMichiharu Kudo, Satoshi Hada. 87-96 [doi]
- Security: the state of the practice (invited talk)Ravi Ganesan. 97 [doi]
- Which PKI (public key infrastructure) is the right one? (panel session)Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip Zimmermann. 98-101 [doi]
- Multi-round passive attacks on server-aided RSA protocolsJohannes Merkle. 102-107 [doi]
- Simple forward-secure signatures from any signature schemeHugo Krawczyk. 108-115 [doi]
- Moiré cryptographyYvo Desmedt, Tri Van Le. 116-124 [doi]
- Funkspiel schemes: an alternative to conventional tamper resistanceJohan Håstad, Jakob Jonsson, Ari Juels, Moti Yung. 125-133 [doi]
- Regulating service access and information release on the WebPiero A. Bonatti, Pierangela Samarati. 134-143 [doi]
- An authorization model for temporal dataAvigdor Gal, Vijayalakshmi Atluri. 144-153 [doi]
- A modular approach to composing access control policiesPiero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati. 164-173 [doi]
- Operating system enhancements to prevent the misuse of system callsMassimo Bernaschi, Emanuele Gabrielli, Luigi V. Mancini. 174-183 [doi]
- Using router stamping to identify the source of IP packetsThomas W. Doeppner, Philip N. Klein, Andrew Koyfman. 184-189 [doi]
- Implementing a distributed firewallSotiris Ioannidis, Angelos D. Keromytis, Steven M. Bellovin, Jonathan M. Smith. 190-199 [doi]
- Security enhanced mobile agentsVijay Varadharajan. 200-209 [doi]
- PRUNES: an efficient and complete strategy for automated trust negotiation over the InternetTing Yu, Xiaosong Ma, Marianne Winslett. 210-219 [doi]
- Cross-domain one-shot authorization using smart cardsRichard Au, Mark Looi, Paul Ashley. 220-227 [doi]
- New constructions for multicast re-keying schemes using perfect hash familiesReihaneh Safavi-Naini, Huaxiong Wang. 228-234 [doi]
- Composition and integrity preservation of secure reactive systemsBirgit Pfitzmann, Michael Waidner. 245-254 [doi]