787 | -- | 804 | Refik Molva. Internet security architecture |
805 | -- | 822 | Hervé Debar, Marc Dacier, Andreas Wespi. Towards a taxonomy of intrusion-detection systems |
823 | -- | 830 | Carl M. Ellison. The nature of a useable PKI |
831 | -- | 860 | Sean W. Smith, Steve Weingart. Building a high-performance, programmable secure coprocessor |
861 | -- | 870 | N. Asokan, Hervé Debar, Michael Steiner, Michael Waidner. Authenticating public terminals |
871 | -- | 884 | Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik. Untraceable mobility or how to travel incognito |
885 | -- | 894 | Ralf C. Hauser, Tony Przygienda, Gene Tsudik. Lowering security overhead in link state routing |