Abstract is missing.
- A Review of the SESAME DevelopmentPer Kaijser. 1-8 [doi]
- The Security of Public Key Cryptosystems Based on Integer FactorizationSiguna Müller, Winfried B. Müller. 9-23 [doi]
- A Uniform Approach to Securing Unix Applications Using SESAMEPaul Ashley, Mark Vandenwauver, Bradley Broom. 24-35 [doi]
- Integrated Management of Network and Host Based Security MechanismsRainer Falk, Markus Trommer. 36-47 [doi]
- Covert Distributed Computing Using Java Through Web SpoofingJeffrey Horton, Jennifer Seberry. 48-57 [doi]
- Differential Cryptanalysis of a Block CipherXun Yi, Kwok-Yan Lam, Yongfei Han. 58-67 [doi]
- On Private-Key Cryptosystems Based on Product CodesHung-Min Sun, Shiuh-Pyng Shieh. 68-79 [doi]
- Key Schedules of Iterative Block CiphersGary Carter, Ed Dawson, Lauren Nielsen. 80-89 [doi]
- Low-Cost Secure Server Connection with Limited-Privilege ClientsUri Blumenthal, N. C. Hien, J. H. Rooney. 90-98 [doi]
- A Solution to Open Standard of PKIQi He, Katia P. Sycara, Zhongmin Su. 99-110 [doi]
- Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode AttacksElke Franz, A. Graubner, Anja Jerichow, Andreas Pfitzmann. 111-122 [doi]
- Correlation Attacks on Up/Down CascadesJovan Dj. Golic, Renato Menicocci. 123-134 [doi]
- A Stream Cipher Based on Linear Feedback over GF(2:::8:::)Gregory G. Rose. 135-146 [doi]
- A Probabilistic Correlation Attack on the Shrinking GeneratorLeone Simpson, Jovan Dj. Golic, Ed Dawson. 147-158 [doi]
- Bounds and Constructions for A:::3:::-code with Multi-sendersReihaneh Safavi-Naini, Yejing Wang. 159-168 [doi]
- Rotation-Symmetric Functions and Fast HashingJosef Pieprzyk, Cheng Xin Qu. 169-180 [doi]
- How to Improve the Nonlinearity of Bijective S-BoxesWilliam Millan. 181-192 [doi]
- Object Modeling of Cryptographic Algorithms with UMLRauli Kaksonen, Petri Mähönen. 193-204 [doi]
- Adapting an Electronic Purse for Internet PaymentsMartin Manninger, Robert Schischka. 205-214 [doi]
- LITESET: A Light-Weight Secure Electronic Transaction ProtocolGoichiro Hanaoka, Yuliang Zheng, Hideki Imai. 215-226 [doi]
- Applications of Linearised and Sub-linearised Polynomials to Information SecurityMarie Henderson. 227-237 [doi]
- Protocol Failures Related to Order of Encryption and SignatureMark Chen, Eric Hughes. 238-249 [doi]
- Protection Against EEPROM Modification AttacksWai W. Fung, James W. Gray III. 250-260 [doi]
- Trends in Quantum Cryptography in Czech RepublicJaroslav Hruby. 261-272 [doi]
- A High Level Language for Conventional Access Control ModelsYun Bai, Vijay Varadharajan. 273-283 [doi]
- Fast Access Control Decisions from Delegation Certificate DatabasesTuomas Aura. 284-295 [doi]
- Meta Objects for Access Control: Role-Based PrincipalsThomas Riechmann, Jürgen Kleinöder. 296-307 [doi]
- A Dynamically Typed Access Control ModelJonathon Tidswell, John Potter. 308-319 [doi]
- Efficient Identity-Based Conference Key Distribution ProtocolsShahrokh Saeednia, Reihaneh Safavi-Naini. 320-331 [doi]
- A Formal Model for Systematic Design of Key Establishment ProtocolsCarsten Rudolph. 332-343 [doi]
- Key Establishment Protocols for Secure Mobile Communications: A Selective SurveyColin Boyd, Anish Mathuria. 344-355 [doi]
- Detecting Key-DependenciesTage Stabell-Kulø, Arne Helme, Gianluca Dini. 356-366 [doi]
- Secret Sharing in Multilevel and Compartmented GroupsHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini. 367-378 [doi]
- On Construction of Cumulative Secret Sharing SchemesHossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang. 379-390 [doi]
- A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian GroupYvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa. 391-402 [doi]
- A User Identification System Using Signature Written with MouseAgus Fanar Syukri, Eiji Okamoto, Masahiro Mambo. 403-414 [doi]
- On Zhang s Nonrepudiable Proxy Signature SchemesNarn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang. 415-422 [doi]