Abstract is missing.
- Trends in the Fight Against Computer-Related DelinquencyBart De Schutter. 1-17 [doi]
- Block Ciphers - A SurveyLars R. Knudsen. 18-48 [doi]
- Cryptographic Primitives for Information Authentication - State of the ArtBart Preneel. 49-104 [doi]
- Recent Developments in the Design of Conventional Cryptographic AlgorithmsBart Preneel, Vincent Rijmen, Antoon Bosselaers. 105-130 [doi]
- Elliptic Curve Public-Key Cryptosystems - An IntroductionErik De Win, Bart Preneel. 131-141 [doi]
- Key Management TechniquesWalter Fumy. 142-162 [doi]
- Security of Computer NetworksJan Verschuren. 163-185 [doi]
- Internet Security ProtocolsWalter Fumy. 186-208 [doi]
- Securing Internet Electronic MailMark Vandenwauver, Frank Jorissen. 208-223 [doi]
- GSM: Security, Services, and the SIMKlaus Vedder. 224-240 [doi]
- TTPs Overview - Concepts and Review of the State of Art from a Technical Point of ViewPeter Landrock. 241-263 [doi]
- Management of Secret Keys: Dynamic Key HandlingJoan Daemen. 264-276 [doi]
- On Solutions to the Key Escrow ProblemMark P. Hoyle, Chris J. Mitchell. 277-306 [doi]
- Smart Cards - Requirements, Properties, and ApplicationsKlaus Vedder, Franz Weikmann. 307-331 [doi]
- Smart Card SecurityErnst Bovelander. 332-337 [doi]
- Security Aspects of the Ecash™ Payment SystemBerry Schoenmakers. 338-352 [doi]
- International Standardisation of IT SecurityKlaus Vedder. 353-365 [doi]
- Security Management - The ProcessDavid W. Roberts. 366-376 [doi]
- Introduction to Computer SecurityBart De Decker. 377-393 [doi]