13 | -- | 15 | Sixto Ortiz Jr.. Will PKI Become a Key to Online Security? |
16 | -- | 19 | Neal Leavitt. Malicious Code Moves to Mobile Devices |
30 | -- | 35 | Morgan Björkander. Graphical Programming Using UML and SDL |
36 | -- | 42 | James A. Whittaker, Jeffrey M. Voas. Toward a More Reliable Theory of Software Reliability |
43 | -- | 51 | Thomas A. Longstaff, Clyde Chittister, Rich Pethia, Yacov Y. Haimes. Are We Forgetting the Risks of Information Technology? |
52 | -- | 59 | William A. Arbaugh, William L. Fithen, John McHugh. Windows of Vulnerability: A Case Study Analysis |
60 | -- | 66 | Randy Butler, Von Welch, Douglas Engert, Ian T. Foster, Steven Tuecke, John Volmer, Carl Kesselman. A National-Scale Authentication Infrastructur |
67 | -- | 74 | Trishul M. Chilimbi, Mark D. Hill, James R. Larus. Making Pointer-Based Data Structures Cache Conscious |
148 | -- | 150 | James A. Senn. The Emergence of M-Commerce |
152 | -- | 153 | Harry Mason. SCSI, the Industry Workhorse, Is Still Working Hard |
154 | -- | 156 | Theresa-Marie Rhyne. Computer Games Influence on Scientific and Information Visualization |
158 | -- | 160 | W. Neville Holmes. Why Johnny Can t Program |