Abstract is missing.
- Support for the File System Security Requirements of Computational E-Mail SystemsTrent Jaeger, Atul Prakash. 1-9 [doi]
- Secure Wireless LANsVaduvur Bharghavan. 10-17 [doi]
- The Design and Implementation of Tripwire: A File System Integrity CheckerGene H. Kim, Eugene H. Spafford. 18-29 [doi]
- Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500Marjan Jurecic, Herbert Bunz. 30-38 [doi]
- A Process-Oriented Methodology for Assessing and Improving Software TrustworthinessEdward Amoroso, Carol Taylor, John Watson, Jonathan Weiss. 39-50 [doi]
- Towards Acceptable Key Escrow SystemsThomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann. 51-58 [doi]
- Protocol Failure in the Escrowed Encryption StandardMatt Blaze. 59-67 [doi]
- Secure Agreement Protocols: Reliable and Atomic Group Multicast in RampartMichael K. Reiter. 68-80 [doi]
- On Key Distribution via True BroadcastingMike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot. 81-88 [doi]
- Meta-ElGamal Signature SchemesPatrick Horster, Holger Petersen, Markus Michels. 96-107 [doi]
- Anonymous Credit CardsSteven H. Low, Sanjoy Paul, Nicholas F. Maxemchuk. 108-117 [doi]
- An Efficient Multiversion Algorithm for Secure Servicing of Transaction ReadsPaul Ammann, Sushil Jajodia. 118-125 [doi]
- A Temporal Authorization ModelElisa Bertino, Claudio Bettini, Pierangela Samarati. 126-135 [doi]
- Propagation of Authorizations in Distributed Database SystemsPierangela Samarati, Paul Ammann, Sushil Jajodia. 136-147 [doi]
- The Design of Substitution-Permutation Networks Resistant to Differential and Linear CryptanalysisHoward M. Heys, Stafford E. Tavares. 148-155 [doi]
- Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic CriteriaM. Zhang, Stafford E. Tavares, L. L. Campbell. 156-165 [doi]
- Authentication Codes That Are ::::r::::-Fold Secure Against SpoofingL. Tombak, Reihaneh Safavi-Naini. 166-169 [doi]
- New Protocols for Third-Party-Based Authentication and Secure BroadcastLi Gong. 176-183 [doi]
- How to Simultaneously Exchange Secrets by General AssumptionsTatsuaki Okamoto, Kazuo Ohta. 184-192 [doi]
- A Key Distribution Method for Object-Based ProtectionWarwick Ford, Michael J. Wiener. 193-197 [doi]
- How to Break Gifford s Cipher (extended abstract)Thomas R. Cain, Alan T. Sherman. 198-209 [doi]
- Parallel Collision Search with Application to Hash Functions and Discrete LogarithmsPaul C. van Oorschot, Michael J. Wiener. 210-218 [doi]
- Application Access Control at Network LevelRefik Molva, Erich Rütsche. 219-228 [doi]
- Network Security ProbeP. Rolin, Laurent Toutain, Sylvain Gombault. 229-240 [doi]
- Security Modelling for OrganisationsAlison Anderson, Dennis Longley, Lam-for Kwok. 241-250 [doi]
- Mainstreaming Automated Information Systems Security Engineering (a case study in security run amok)James W. Coyne, Norman C. Kluksdahl. 251-257 [doi]
- The Compatibility of PoliciesHeather M. Hinton, E. Stewart Lee. 258-269 [doi]
- Prerequisite ConfidentialityJohn P. Nestor, E. S. Lee. 282-293 [doi]