Abstract is missing.
- A Few Thoughts on E-CommerceYacov Yacobi. 1-2 [doi]
- New CBC-MAC Forgery AttacksKarl Brincat, Chris J. Mitchell. 3-14 [doi]
- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000Amr M. Youssef, Guang Gong. 15-20 [doi]
- Improved Cryptanalysis of the Self-Shrinking GeneratorErik Zenner, Matthias Krause, Stefan Lucks. 21-35 [doi]
- Attacks Based on Small Factors in Various Group StructuresChris Pavlovski, Colin Boyd. 36-50 [doi]
- On Classifying Conference Key Distribution ProtocolsShahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo. 51-59 [doi]
- Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMIJu-Sung Kang, Okyeon Yi, Dowon Hong, Hyun-Sook Cho. 60-73 [doi]
- New Public-Key Cryptosystem Using Divisor Class GroupsHwankoo Kim, Sang-Jae Moon. 74-83 [doi]
- First Implementation of Cryptographic Protocols Based on Algebraic Number FieldsAndreas Meyer, Stefan Neis, Thomas Pfahler. 84-103 [doi]
- Practical Key Recovery SchemesSung-Ming Yen. 104-114 [doi]
- Non-deterministic ProcessorsDavid May, Henk L. Muller, Nigel P. Smart. 115-129 [doi]
- Personal Secure BootingNaomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves. 130-144 [doi]
- Evaluation of Tamper-Resistant Software Deviating from Structured Programming RulesHideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe. 145-158 [doi]
- A Strategy for MLS WorkflowVlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan. 159-175 [doi]
- Condition-Driven Integration of Security ServicesB. Clifford Neuman. 176 [doi]
- SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying CodesEun-Sun Cho, Sunho Hong, Sechang Oh, Hong-Jin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park. 177-189 [doi]
- Secure and Private Distribution of Online Video and Some Related Cryptographic IssuesFeng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu. 190-205 [doi]
- Private Information Retrieval Based on the Subgroup Membership ProblemAkihiro Yamamura, Taiichi Saito. 206-220 [doi]
- A Practical English Auction with One-Time RegistrationKazumasa Omote, Atsuko Miyaji. 221-234 [doi]
- A User Authentication Scheme with Identity and Location PrivacyShoichi Hirose, Susumu Yoshida. 235-246 [doi]
- An End-to-End Authentication Protocol in Wireless Application ProtocolJong-Phil Yang, Weon Shin, Kyung Hyune Rhee. 247-259 [doi]
- Error Detection and Authentication in Quantum Key DistributionAkihiro Yamamura, Hirokazu Ishizuka. 260-273 [doi]
- An Axiomatic Basis for Reasoning about Trust in PKIsChuchang Liu, Maris A. Ozols, Anthony Cant. 274-291 [doi]
- A Knowledge-Based Approach to Internet AuthorizationsAlong Lin. 292-304 [doi]
- Applications of Trusted Review to Information SecurityJohn Yesberg, Marie Henderson. 305-319 [doi]
- Network Security Modeling and Cyber Attack Simulation MethodologySung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee. 320-333 [doi]
- Cryptographic Salt: A Countermeasure against Denial-of-Service AttacksDongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson. 334-343 [doi]
- Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoSOliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber. 344-359 [doi]
- Improving the Availability of Time-Stamping ServicesArne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson. 360-375 [doi]
- Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian GroupBrian King. 376-391 [doi]
- Democratic SystemsHossein Ghodosi, Josef Pieprzyk. 392-402 [doi]
- Efficient and Unconditionally Secure Verifiable Threshold Changeable SchemeAyako Maeda, Atsuko Miyaji, Mitsuru Tada. 403-416 [doi]
- Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit CertificatesDouglas R. Stinson, Reto Strobl. 417-434 [doi]
- How to Construct Fail-Stop Confirmer Signature SchemesReihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang. 435-444 [doi]
- Signature Schemes Based on 3rd Order Shift RegistersChik-How Tan, Xun Yi, Chee Kheong Siew. 445-459 [doi]
- Anonymous Statistical Survey of AttributesToru Nakanishi, Yuji Sugiyama. 460-473 [doi]
- Secure Mobile Agent Using Strong Non-designated Proxy SignatureByoungcheon Lee, Heesun Kim, Kwangjo Kim. 474 [doi]
- Elliptic Curve Based Password Authenticated Key Exchange ProtocolsColin Boyd, Paul Montague, Khanh Quoc Nguyen. 487-501 [doi]
- Elliptic Curve Cryptography on a Palm OS DeviceAndré Weimerskirch, Christof Paar, Sheueling Chang Shantz. 502-513 [doi]
- Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite FieldKyungah Shim. 514-520 [doi]