Abstract is missing.
- Efficient and Secure Source Authentication for MulticastAdrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar. [doi]
- An Algebraic Approach to IP TracebackDrew Dean, Matthew K. Franklin, Adam Stubblefield. [doi]
- TRICERT: A Distributed Certified E-Mail SchemeGiuseppe Ateniese, Breno de Medeiros, Michael T. Goodrich. [doi]
- Decentralized Jini SecurityPasi Eronen, Pekka Nikander. [doi]
- Wireless Security - Is It Real?Alfred Menezes.
- Building Certifications Paths: Forward vs. ReverseYassir Elley, Anne H. Anderson, Steve Hanna, Sean Mullan, Radia J. Perlman, Seth Proctor. [doi]
- Implementation of Crossrealm Referral Handling in the MIT Kerberos ClientJonathan T. Trostle, Irina Kosinovsky, Michael M. Swift. [doi]
- Principles of Policy in Secure GroupsHugh Harney, Andrea Colgrove, Patrick Drew McDaniel. [doi]
- Authenticating Streamed Data in the Presence of Random Packet LossPhilippe Golle, Nagendra Modadugu. [doi]
- An Architecture for Flexible, High Assurance, Multi-Security Domain NetworksTim Gibson. [doi]
- Authentication and Key Agreement Via Memorable PasswordsTaekyoung Kwon. [doi]
- Practical Experiences with ATM EncryptionGregory T. Byrd, Nathan Hillery, Jim Symon. [doi]
- Trust Management for IPsecMatt Blaze, John Ioannidis, Angelos D. Keromytis. [doi]
- Cryptology As a Network ServiceTom Berson, Drew Dean, Matthew K. Franklin, Diana K. Smetters, Mike Spreitzer. [doi]
- Limiting the Disclosure of Access Control Policies during Automated Trust NegotiationKent E. Seamons, Marianne Winslett, Ting Yu. [doi]
- Termination in Language-based SystemsAlgis Rudys, John Clements, Dan S. Wallach. [doi]
- SPL: An Access Control Language for Security Policies and Complex ConstraintsCarlos Ribeiro, Andre Zuquete, Paulo Ferreira, Paulo Guedes. [doi]
- Security Risks Of Peer-To-Peer NetworkingSteven M. Bellovin.