Abstract is missing.
- A Revocable Backup SystemDan Boneh, Richard J. Lipton. [doi]
- A Secure Environment for Untrusted Helper ApplicationsIan Goldberg, David Wagner, Randi Thomas, Eric A. Brewer. [doi]
- Chrg-http: A Tool for Micropayments on the World Wide WebSteven H. Low. [doi]
- Public Key Distribution with Secure DNSJames M. Galvin. [doi]
- Texas A&M University Anarchistic Key Authorization (AKA)David Safford, Douglas Lee Schales, David Hess. [doi]
- Murphy's Law and Computer SecurityWietse Venema. [doi]
- NetKuang - A Multi-Host Configuration Vulnerability CheckerDan Zerkle, Karl N. Levitt. [doi]
- Problem Areas for the IP Security ProtocolsSteven M. Bellovin. [doi]
- Building Systems That Flexibly Download Executable ContentTrent Jaeger, Atul Prakash. [doi]
- Compliance Defects in Public Key CryptographyDon Davis. [doi]
- Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary AttacksBarry Jaspan. [doi]
- Confining Root Programs with Domain and Type EnforcementKenneth M. Walker, Daniel F. Sterne, Lee Badger, Michael J. Petkac, David L. Sherman, Karen A. Oostendorp. [doi]
- A Framework for Building an Electronic Currency SystemLei Tang. [doi]