Abstract is missing.
- Fair Exchange with a Semi-Trusted Third Party (extended abstract)Matthew K. Franklin, Michael K. Reiter. 1-5 [doi]
- Optimistic Protocols for Fair ExchangeN. Asokan, Matthias Schunter, Michael Waidner. 7-17 [doi]
- Secure Names for Bit-StringsStuart Haber, W. Scott Stornetta. 28-35 [doi]
- A Calculus for Cryptographic Protocols: The Spi CalculusMartÃn Abadi, Andrew D. Gordon. 36-47 [doi]
- Authentication via Keystroke DynamicsFabian Monrose, Aviel D. Rubin. 48-56 [doi]
- Path Independence for Authentication in Large-Scale SystemsMichael K. Reiter, Stuart G. Stubblebine. 57-66 [doi]
- Proactive Password Checking with Decision TreesFrancesco Bergadano, Bruno Crispo, Giancarlo Ruffo. 67-77 [doi]
- Verifiable Partial Key EscrowMihir Bellare, Shafi Goldwasser. 78-91 [doi]
- New Blind Signatures Equivalent to Factorization (extended abstract)David Pointcheval, Jacques Stern. 92-99 [doi]
- Proactive Public Key and Signature SystemsAmir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung. 100-110 [doi]
- A New On-Line Cash Check SchemeRobert H. Deng, Yongfei Han, Albert B. Jeng, Teow-Hin Ngair. 111-116 [doi]
- Conditional Purchase OrdersJohn Kelsey, Bruce Schneier. 117-124 [doi]
- The Specification and Implementation of Commercial Security Requirements Including Dynamic Segregation of DutiesSimon N. Foley. 125-134 [doi]
- On the Importance of Securing Your Bins: The Garbage-man-in-the-middle AttackMarc Joye, Jean-Jacques Quisquater. 135-141 [doi]
- Improved Security Bounds for Pseudorandom PermutationsJacques Patarin. 142-150 [doi]
- Asymmetric Fingerprinting for Larger CollusionsBirgit Pfitzmann, Michael Waidner. 151-160 [doi]