Abstract is missing.
- Unified Login with Pluggable Authentication Modules (PAM)Vipin Samar. 1-10 [doi]
- Securing ATM NetworksShaw-Cheng Chuang. 19-30 [doi]
- Diffie-Hellman Key Distribution Extended to Group CommunicationMichael Steiner, Gene Tsudik, Michael Waidner. 31-37 [doi]
- The Omega Key Management ServiceMichael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright. 38-47 [doi]
- Proxy Signatures for Delegating Signing OperationMasahiro Mambo, Keisuke Usuda, Eiji Okamoto. 48-57 [doi]
- Batch Exponentiation: A Fast DLP-Based Signature Generation StrategyDavid M Raïhi, David Naccache. 58-61 [doi]
- The Failure of Anti-Hacking Legislation: A Hong Kong PerspectiveRynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung. 62-67 [doi]
- Human-Computer Cryptography: An AttemptTsutomu Matsumoto. 68-75 [doi]
- Revokable and Versatile Electronic Money (extended abstract)Markus Jakobsson, Moti Yung. 76-87 [doi]
- An Authentication Logic Supporting Synchronization, Revocation, and RecencyStuart G. Stubblebine, Rebecca N. Wright. 95-105 [doi]
- An Approach to the Formal Verification of Cryptographic ProtocolsDominique Bolignano. 106-118 [doi]
- An Advanced Commit Protocol for MLS Distributed Database SystemsIndrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini. 119-128 [doi]
- Several Secure Store and Forward DevicesDavid M. Goldschlag. 129-137 [doi]
- An Experiment on DES Statistical CryptanalysisSerge Vaudenay. 139-147 [doi]
- Breaking and Repairing a Convertible Undeniable Signature SchemeMarkus Michels, Holger Petersen, Patrick Horster. 148-152 [doi]
- Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting CodesHung-Min Sun, Shiuh-Pyng Shieh. 153-156 [doi]
- Access Control and Signatures via Quorum Secret SharingMoni Naor, Avishai Wool. 157-168 [doi]
- A Non-Timestamped Authorization Model for Data Management SystemsElisa Bertino, Sushil Jajodia, Pierangela Samarati. 169-178 [doi]