Abstract is missing.
- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control SystemAdrian Spalka, Armin B. Cremers, Hartmut Lehmler. 1-17
- Towards a New Authorisation Paradigm for ExtranetsRichard Au, Mark Looi, Paul Ashley. 18-29
- Custom Safety Policies in Safe ErlangLawrie Brown. 30-40
- A Proposal of a New Public Key Cryptosystem Using Matrices over a RingHeajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung. 41-48
- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman AssumptionJoonsang Baek, Byoungcheon Lee, Kwangjo Kim. 49-58
- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical PerformanceYasuyuki Sakai, Kouichi Sakurai. 59-73
- High Performance Agile Crypto ModulesChandana Gamage, Jussipekka Leiwo, Yuliang Zheng. 74-88
- A Three-Party HTTP Proxy to Support Internet Content RegulationAgung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell. 89-96
- Cryptanalysis of the ::::m::::-Permutation Protection SchemesHongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng. 97-111
- An Implementation of Bitsliced DES on the Pentium MMX:::TM::: ProcessorLauren May, Lyta Penna, Andrew Clark. 112-122
- Securing Large E-Commerce NetworksPanagiotis Sklavos, Aggelos Varvitsiotis, Despina Polemi. 123-133
- Passive Entities: A Strategy for Electronic Payment DesignErnest Foo, Colin Boyd. 134-148
- Key Recovery System for the Commercial EnvironmentJuanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson. 149-162
- A Key Escrow Scheme with Time-Limited Monitoring for One-Way CommunicationMasayuki Abe, Masayuki Kanda. 163-177
- Key Management for Secure Multicast with Dynamic ControllerHartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang. 178-190
- PKI Seeks a Trusting RelationshipAudun Jøsang, Ingar Glenn Pedersen, Dean Povey. 191-205
- The PKI Specification Dilemma: A Formal SolutionMaris A. Ozols, Marie Henderson, Chuchang Liu, Anthony Cant. 206-219
- Iterative Probabilistic Cryptanalysis of RC4 Keystream GeneratorJovan Dj. Golic. 220-233
- Security Weaknesses in a Randomized Stream CipherNiels Ferguson, Bruce Schneier, David Wagner. 234-241
- Two-Stage Optimisation in the Design of Boolean FunctionsJohn A. Clark, Jeremy Jacob. 242-254
- A Novel Engine for Various Intrusion Detection MethodsZhu Hui, Daniel Tan. 255-265
- Construction and Categories of CodesG. R. Blakley, I. Borosh, Andreas Klappenecker. 266-277
- Cryptanalysis of Polynominal Authentication and Signature SchemeHongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng. 278-288
- Secure Transactions with Mobile Agents in Hostile EnvironmentsPanayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos. 289-297
- A Multisignature Scheme with Message Flexibility, Order Flexibility and Order VerifiabilityShirow Mitomi, Atsuko Miyaji. 298-312
- Light Weight Broadcast Exclusion Using Secret SharingNatsume Matsuzaki, Jun Anzai, Tsutomu Matsumoto. 313-327
- Cheating Prevention in Secret SharingHossein Ghodosi, Josef Pieprzyk. 328-341
- On Multiplicative Secret Sharing SchemesHuaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao. 342-351
- On the Security of the RSA-Based Multisignature Scheme for Various Group StructuresHiroshi Doi, Masahiro Mambo, Eiji Okamoto. 352-367
- Fail-Stop Confirmer SignaturesYi Mu, Vijay Varadharajan. 368-377
- An Extremely Small and Efficient Identification SchemeWilliam D. Banks, Daniel Lieman, Igor Shparlinski. 378-384
- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature SchemeKouichi Sakurai, Shingo Miyazaki. 385-399
- AKA Protocols for Mobile CommunicationsKook-Heui Lee, Sang-Jae Moon. 400-411
- A Three Phased Schema for Sealed Bid Auction System DesignKapali Viswanathan, Colin Boyd, Ed Dawson. 412-426
- An Online Public Auction Protocol Protecting Bidder PrivacyKhanh Quoc Nguyen, Jacques Traoré. 427-442
- Algorithms to Speed Up Computations in Threshold RSABrian King. 443-456
- Sharing Block CiphersErnest F. Brickell, Giovanni Di Crescenzo, Yair Frankel. 457-470
- All Sail, No Anchor, 1: Cryptography, Risk, and e-CommerceBob Blakley, G. R. Blakley. 471-476
- Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing SocietyAlan Underwood. 477-486