1581 | -- | 1583 | Madjid Merabti, Qi Shi, Rolf Oppliger. Advanced security techniques for network protection |
1584 | -- | 1593 | Along Lin, R. Brown. The application of security policy to role-based access control and the common data security architecture |
1594 | -- | 1605 | Stephane Doyon, Mourad Debbabi. On object initialization in the Java bytecode |
1606 | -- | 1612 | Jianying Zhou. Further analysis of the Internet key exchange protocol |
1613 | -- | 1620 | Paul Ashley, Mark Vandenwauver, Frank Siebenlist. Applying authorization to intranets: architectures, issues and APIs |
1621 | -- | 1626 | Ross J. Anderson, Jong-Hyeon Lee. Jikzi - a new framework for security policy, trusted publishing and electronic commerce |
1627 | -- | 1637 | N. Asokan, Philip Ginzboorg. Key agreement in ad hoc networks |
1638 | -- | 1644 | Seong-Min Hong, SeungWon Lee, Yongsoo Park, Yookun Cho, Hyunsoo Yoon. On the construction of a powerful distributed authentication server without additional key management |
1645 | -- | 1654 | Maria Felicia Florio, Roberto Gorrieri, Gianluigi Marchetti. Coping with denial of service due to malicious Java applets |
1655 | -- | 1666 | Pascal Urien. Internet card, a smart card as a true Internet node |
1667 | -- | 1676 | Wayne A. Jansen. Countermeasures for mobile agent security |
1677 | -- | 1680 | Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh. Randomization enhanced Chaum s blind signature scheme |
1681 | -- | 1701 | Lakshminath R. Dondeti, Sarit Mukherjee, Ashok Samal. Scalable secure one-to-many group communication using dual encryption |
1702 | -- | 1715 | Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia. Modeling requests among cooperating intrusion detection systems |
1716 | -- | 1723 | Denis Trcek. Security policy conceptual modeling and formalization for networked information systems |