Abstract is missing.
- Error-tolerant password recoveryNiklas Frykholm, Ari Juels. 1-9 [doi]
- Twin signatures: an alternative to the hash-and-sign paradigmDavid Naccache, David Pointcheval, Jacques Stern. 20-27 [doi]
- The BiBa one-time signature and broadcast authentication protocolAdrian Perrig. 28-37 [doi]
- Policy algebras for access control: the propositional caseDuminda Wijesekera, Sushil Jajodia. 38-47 [doi]
- A Chinese wall security model for decentralized workflow systemsVijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni. 48-57 [doi]
- Design and implementation of a flexible RBAC-service in an object-oriented scripting languageGustaf Neumann, Mark Strembeck. 58-67 [doi]
- An efficient security verification method for programs with stack inspectionNaoya Nitta, Yoshiaki Takata, Hiroyuki Seki. 68-77 [doi]
- The performance of public key-enabled kerberos authentication in mobile computing applicationsAlan Harbitter, Daniel A. Menascé. 78-85 [doi]
- A new approach to DNS security (DNSSEC)Giuseppe Ateniese, Stefan Mangard. 86-95 [doi]
- Events in security protocolsFederico Crazzolara, Glynn Winskel. 96-105 [doi]
- On the relationship between strand spaces and multi-agent systemsJoseph Y. Halpern, Riccardo Pucella. 106-115 [doi]
- A verifiable secret shuffle and its application to e-votingC. Andrew Neff. 116-125 [doi]
- Tangler: a censorship-resistant publishing system based on document entanglementsMarc Waldman, David Mazières. 126-135 [doi]
- Flexible authentication of XML documentsPremkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine. 136-145 [doi]
- Interoperable strategies in automated trust negotiationTing Yu, Marianne Winslett, Kent E. Seamons. 146-155 [doi]
- Distributed credential chain discovery in trust management: extended abstractNinghui Li, William H. Winsborough, John C. Mitchell. 156-165 [doi]
- Inductive methods and contract-signing protocolsRohit Chadha, Max I. Kanovich, Andre Scedrov. 176-185 [doi]
- The faithfulness of abstract protocol analysis: message authenticationJoshua D. Guttman, F. Javier Thayer, Lenore D. Zuck. 186-195 [doi]
- OCB: a block-cipher mode of operation for efficient authenticated encryptionPhillip Rogaway, Mihir Bellare, John Black, Ted Krovetz. 196-205 [doi]
- Paillier s cryptosystem revisitedDario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen. 206-214 [doi]
- Securely combining public-key cryptosystemsStuart Haber, Benny Pinkas. 215-224 [doi]
- Practical forward secure group signature schemesDawn Xiaodong Song. 225-234 [doi]
- Formalizing GDOI group key management requirements in NPATRLCatherine Meadows, Paul F. Syverson. 235-244 [doi]
- Accountable-subgroup multisignatures: extended abstractSilvio Micali, Kazuo Ohta, Leonid Reyzin. 245-254 [doi]
- Provably authenticated group Diffie-Hellman key exchangeEmmanuel Bresson, Olivier Chevassut, David Pointcheval, Jean-Jacques Quisquater. 255-264 [doi]