Abstract is missing.
- International Cryptography (Abstract)Doug McGowan. 1
- Reaction Attacks against several Public-Key CryptosystemsChris Hall, Ian Goldberg, Bruce Schneier. 2-12
- Cryptanalysis of some AES Candidate AlgorithmsWenling Wu, Bao Li, Dengguo Feng, Sihan Qing. 13-21
- Issues in the Design of a Language for Role Based Access ControlMichael Hitchens, Vijay Varadharajan. 22-38
- Extending ERLANG for Safe Mobile Code ExecutionLawrie Brown, Dan Sahlin. 39-53
- Detachable Electronic CoinsChris Pavlovski, Colin Boyd, Ernest Foo. 54-70
- Linear Secret Sharing with Divisible SharesJosef Pieprzyk. 71-86
- Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed RecoveryFabrice Boudot, Jacques Traoré. 87-102
- Zero-Knowledge Proofs of Possession of Digital Signatures and Its ApplicationsKhanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan. 103-118
- Signature Scheme for Controlled EnvironmentsKapali Viswanathan, Colin Boyd, Ed Dawson. 119-134
- On the Cryptographic Value of The q:::th::: Root ProblemCheryl L. Beaver, Peter Gemmell, Anna M. Johnston, William D. Neumann. 135-142
- Protecting Critical Information Systems (Abstract)Sushil Jajodia. 143
- Delegation Chains Secure up to Constant LengthMasayuki Abe, Tatsuaki Okamoto. 144-156
- Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale NetworksGoichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai. 157-168
- Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service AttackShoichi Hirose, Kanta Matsuura. 169-182
- An Extended Logic for Analyzing Timed-Release Public-Key ProtocolsMichiharu Kudo, Anish Mathuria. 183-198
- Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA ProjectMontse Rubia, Juan Carlos Cruellas, Manuel Medina. 199-215
- User Identification System Based on Biometrics for KeystrokeKazumasa Omote, Eiji Okamoto. 216-229
- Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart CardsConstantinos Markantonakis. 230-243
- Send Message into a Definite FutureWenbo Mao. 244-251
- Efficient Accumulators without Trapdoor Extended AbstractsTomas Sander. 252-262
- Evolutionary Heuristics for Finding Cryptographically Strong S-BoxesWilliam Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson. 263-274
- Incremental Authentication of Tree-Structured DocumentsPatrik Ekdahl, Ben J. M. Smeets. 275-283
- Plateaued FunctionsYuliang Zheng, Xian-Mo Zhang. 284-300
- On the Linear Complexity of the Naor-Reingold Pseudo-Random FunctionFrances Griffin, Igor Shparlinski. 301-308
- On the Channel Capacity of Narrow-Band Subliminal ChannelsKazukuni Kobara, Hideki Imai. 309-323