Abstract is missing.
- A High-Performance Network Intrusion Detection SystemR. Sekar, Y. Guang, S. Verma, T. Shanbhag. 8-17 [doi]
- The Proactive Security Toolkit and ApplicationsBoaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai. 18-27 [doi]
- A Fuzzy Commitment SchemeAri Juels, Martin Wattenberg. 28-36 [doi]
- On the Fly Signatures Based on FactoringGuillaume Poupard, Jacques Stern. 37-45 [doi]
- Proof-Carrying AuthenticationAndrew W. Appel, Edward W. Felten. 52-62 [doi]
- Password Hardening Based on Keystroke DynamicsFabian Monrose, Michael K. Reiter, Susanne Wetzel. 73-82 [doi]
- Secure Protocol Transformation via Expansion : From Two-Party to GroupsAlain J. Mayer, Moti Yung. 83-92 [doi]
- A Compact and Fast Hybrid Signature Scheme for Multicast Packet AuthenticationPankaj Rohatgi. 93-100 [doi]
- Scalable Multicast Security in Dynamic GroupsRefik Molva, Alain Pannetrat. 101-112 [doi]
- Anonymous Authentication with Subset Queries (extended abstract)Dan Boneh, Matthew K. Franklin. 113-119 [doi]
- Efficient Private Bidding and Auctions with an Oblivious Third PartyChristian Cachin. 120-127 [doi]
- Using Smartcards to Secure a Personalized Gambling DeviceWilliam Aiello, Aviel D. Rubin, Martin Strauss. 128-137 [doi]
- Efficient Verifiable Encryption (and Fair Exchange) of Digital SignaturesGiuseppe Ateniese. 138-146 [doi]