Abstract is missing.
- A Watermarking Scheme Based on the Characteristic of Addition among DCT CoefficientsMinoru Kuribayashi, Hatsukazu Tanaka. 1-14 [doi]
- Affine Invariant Watermarks for 3D Polygonal and NURBS Based ModelsOliver Benedens. 15-29 [doi]
- A Steganographic Framework for Reference Colour Based Encoding and Cover Image SelectionRené Rosenbaum, Heidrun Schumann. 30-43 [doi]
- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and ScalingFrancesc Sebé, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí. 44-53 [doi]
- Region-Based Watermarking by Distribution AdjustmentGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona. 54-68 [doi]
- Hiding Information in Color Images Using Small Color PalettesTapio Seppänen, Kaisu Mäkelä, Anja Keskinarkaus. 69-81 [doi]
- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant SoftwareHideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya. 82-96 [doi]
- Characteristics of Some Binary Codes for FingerprintingTina Lindkvist. 97-107 [doi]
- An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary TreesKazumasa Omote, Atsuko Miyaji. 108-120 [doi]
- Unlinkable Divisible Electronic CashToru Nakanishi, Yuji Sugiyama. 121-134 [doi]
- Weighted One-Way Hash Chain and Its ApplicationsSung-Ming Yen, Yuliang Zheng. 135-148 [doi]
- Linkability in Practical Electronic Cash DesignGreg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson. 149-163 [doi]
- Towards a Practical Secure Framework for Mobile Code CommerceGaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot. 164-178 [doi]
- Probabilistic Methods in Multicast Key ManagementAli Aydin Selçuk, Deepinder P. Sidhu. 179-193 [doi]
- Classification of Authentication Protocols: A Practical ApproachDongGook Park, Colin Boyd, Ed Dawson. 194-208 [doi]
- Exploring Fair Exchange Protocols Using Specification AnimationColin Boyd, Peter Kearney. 209-223 [doi]
- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its EvaluationDaisuke Nojiri, Goichiro Hanaoka, Hideki Imai. 224-236 [doi]
- An Efficient Protocol for Certified Electronic MailJosep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger. 237-248 [doi]
- Performance Analysis of Secure Web Server Based on SSLXiaodong Lin, Johnny W. Wong, Weidong Kou. 249-261 [doi]
- Sherlock: Commercial High Assurance Network ComputingStephen P. Morgan, Stephen W. Neal, Melissa A. Hartman, Matthew R. Laue. 262-276 [doi]
- The Role of the Development Process in Operating System SecurityChristian Payne. 277-291 [doi]
- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and FactorizationReihaneh Safavi-Naini, Willy Susilo. 292-307 [doi]
- A Signcryption Scheme Based on Integer FactorizationRon Steinfeld, Yuliang Zheng. 308-322 [doi]