Abstract is missing.
- Does Licensing Require New Access Control Techniques?Ralf C. Hauser. 1-8 [doi]
- A Cryptographic File System for UNIXMatt Blaze. 9-16 [doi]
- A Particular Solution to Provide Secure Communications in an Ethernet EnvironmentMiguel Soriano, Jordi Forné, Francisco Recacha, José L. Melús. 17-25 [doi]
- Lower Bounds on Messages and Rounds for Network Authentication ProtocolsLi Gong. 26-37 [doi]
- Optimality of Multi-Domain ProtocolsRaphael Yahalom. 38-48 [doi]
- On Simple and Secure Key DistributionGene Tsudik, Els Van Herreweghen. 49-57 [doi]
- A New Signature Scheme Based on the DSA Giving Message RecoveryKaisa Nyberg, Rainer A. Rueppel. 58-61 [doi]
- Random Oracles are Practical: A Paradigm for Designing Efficient ProtocolsMihir Bellare, Phillip Rogaway. 62-73 [doi]
- Sorting Out Signature SchemesBirgit Pfitzmann. 74-85 [doi]
- Digital Signatures: Can They be Accepted as Legal Signatures in EDI?Patrick W. Brown. 86-92 [doi]
- Design of the Commercial Data Masking Facility Data Privacy AlgorithmDonald Byron Johnson, Stephen M. Matyas, An V. Le, John D. Wilkins. 93-96 [doi]
- Adding Time to a Logic of AuthenticationPaul F. Syverson. 97-101 [doi]
- Security Planning for Personal CommunicationsDan Brown. 107-111 [doi]
- A Framework for Distributed AuthorizationThomas Y. C. Woo, Simon S. Lam. 112-118 [doi]
- A Pump for Rapid, Reliable, Secure CommunicationMyong H. Kang, Ira S. Moskowitz. 119-129 [doi]
- Authorizations in Relational Database Management SystemsElisa Bertino, Pierangela Samarati, Sushil Jajodia. 130-139 [doi]
- High Assurance Discretionary Access Control for Object BasesElisa Bertino, Pierangela Samarati, Sushil Jajodia. 140-150 [doi]
- Denial of ServiceRoger M. Needham. 151-153 [doi]
- Analysis of an Algorithm for Distributed Recognition and AccountabilityCalvin Ko, Deborah A. Frincke, Terrance Goan, Todd L. Heberlein, Karl N. Levitt, Biswanath Mukherjee, Christopher Wee. 154-164 [doi]
- Integration of DCE and Local Registries: Design ApproachesPing Lin, C. Sekar Chandersekaran. 165-170 [doi]
- Systematic Generation of Cryptographically Robust S-BoxesJennifer Seberry, Xian-Mo Zhang, Yuliang Zheng. 171-182 [doi]
- Differential Cryptanalysis of Hash Functions Based on Block CiphersBart Preneel, René Govaerts, Joos Vandewalle. 183-188 [doi]
- Verifiable Secret Sharing for Monotone Access StructuresThomas Beth, Hans-Joachim Knobloch, Marcus Otten. 189-194 [doi]
- Securing a Global Village and Its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications NetworksHank M. Kluepfel. 195-212 [doi]
- Cryptanalysis and Protocol Failures (abstract)Gustavus J. Simmons. 213-214 [doi]
- Why Cryptosystems FailRoss J. Anderson. 215-227 [doi]
- Towards Practical Proven Secure Authenticated Key DistributionYvo Desmedt, Mike Burmester. 228-231 [doi]
- Extending Cryptographic Logics of Belief to Key Agreement ProtocolsPaul C. van Oorschot. 232-243 [doi]
- Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File CompromiseSteven M. Bellovin, Michael Merritt. 244-250 [doi]