551 | -- | 560 | Reto Kohlas, Ueli Maurer. Reasoning about public-key certification: on bindings between entities and public keys |
561 | -- | 570 | Moni Naor, Kobbi Nissim. Certificate revocation and certificate update |
571 | -- | 581 | Stuart G. Stubblebine, Catherine A. Meadows. Formal characterization and automated analysis of known-pair and chosen-text attacks |
582 | -- | 592 | Stephen T. Kent, Charles Lynn, Karen Seo. Secure Border Gateway Protocol (S-BGP) |
593 | -- | 610 | N. Asokan, Victor Shoup, Michael Waidner. Optimistic fair exchange of digital signatures |
611 | -- | 627 | Mihir Bellare, Juan A. Garay, Ralf C. Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner. Design, implementation, and deployment of the iKP secure electronic payment system |
628 | -- | 639 | Giuseppe Ateniese, Michael Steiner, Gene Tsudik. New multiparty authentication services and key agreement protocols |