Abstract is missing.
- Cryptographic Security for Mobile CodeJoy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth. 2-11 [doi]
- Networked Cryptographic Devices Resilient to CapturePhilip D. MacKenzie, Michael K. Reiter. 12-25 [doi]
- Protection of Keys against Modification AttackWai W. Fung, Mordecai J. Golin, James W. Gray III. 26 [doi]
- Data Mining Methods for Detection of New Malicious ExecutablesMatthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo. 38-49 [doi]
- Evaluation of Intrusion Detectors: A Decision Theory ApproachJohn E. Gaffney Jr., Jacob W. Ulvila. 50 [doi]
- On Confidentiality and AlgorithmsJohan Agat, David Sands. 64-77 [doi]
- Preserving Information Flow Properties under RefinementHeiko Mantel. 78 [doi]
- Understanding Trust Management SystemsStephen Weeks. 94-105 [doi]
- SD3: A Trust Management System with Certified EvaluationTrevor Jim. 106-115 [doi]
- Formal Treatment of Certificate Revocation under Communal Access ControlXuhui Ao, Naftaly H. Minsky, Victoria Ungureanu. 116 [doi]
- Information-Theoretic Measures for Anomaly DetectionWenke Lee, Dong Xiang. 130-143 [doi]
- A Fast Automaton-Based Method for Detecting Anomalous Program BehaviorsR. Sekar, M. Bendre, D. Dhurjati, P. Bollineni. 144-155 [doi]
- Intrusion Detection via Static AnalysisDavid Wagner, Drew Dean. 156 [doi]
- Performance of Public-Key-Enabled Kerberos Authentication in Large NetworksAlan Harbitter, Daniel A. Menascé. 170-183 [doi]
- A Model for Asynchronous Reactive Systems and its Application to Secure Message TransmissionBirgit Pfitzmann, Michael Waidner. 184 [doi]
- Cryptographic Key Generation from VoiceFabian Monrose, Michael K. Reiter, Qi Li, Susanne Wetzel. 202-213 [doi]
- A Trend Analysis of ExploitationsHilary K. Browne, William A. Arbaugh, John McHugh, William L. Fithen. 214 [doi]
- Graph-Based Authentication of Digital StreamsSara K. Miner, Jessica Staddon. 232-246 [doi]
- ELK, A New Protocol for Efficient Large-Group Key DistributionAdrian Perrig, Dawn Xiaodong Song, J. D. Tygar. 247 [doi]