Abstract is missing.
- Trends in the Fight Against Computer-Related DelinquencyBart De Schutter. 3-19
- Technical Approaches to Thwart Computer FraudJoos Vandewalle, René Govaerts, Bart Preneel. 20-30
- Public Key CryptographyMarijke De Soete. 33-49
- Better Login Protocols for Computer NetworksDominique de Waleffe, Jean-Jacques Quisquater. 50-70
- Secret-Key Exchange with AuthenticationJohan van Tilburg. 71-86
- Information Authentication: Hash Functions and Digital SignaturesBart Preneel, René Govaerts, Joos Vandewalle. 87-131
- Key ManagementWalter Fumy. 132-147
- Evaluation Criteria for IT SecurityDavid W. Roberts. 151-161
- Standardization of Cryptographic TechniquesBart Preneel. 162-173
- Numbers Can Be a Better Form of Cash than PaperDavid Chaum. 174-178
- ISO-OSI Security ArchitectureJan Verschuren, René Govaerts, Joos Vandewalle. 179-192
- Security Aspects of Mobile CommunicationsKlaus Vedder. 193-210
- (Local Area) Network SecurityWalter Fumy. 211-226
- Cryptography Within Phase I of the EEC-RACE ProgrammeAntoon Bosselaers, René Govaerts, Joos Vandewalle. 227-234
- EDI SecurityGordon Lennox. 235-243
- AXYTRANS: Physical Funds Transport and DESMarc Geoffroy, Ronny Bjones, Hedwig Cnudde. 244-256
- Unix Security & KerberosBart De Decker. 257-274