Abstract is missing.
- PLASMA: Platform for Secure Multimedia ApplicationsA. Kranning. 1-12
- High-Level Security Issues in Multimedia/Hypertext SystemsEduardo B. Fernández, Krishnakumar R. Nair, María M. Larrondo-Petrie, Yan Xu. 13-24
- Approaches to Security in Healthcare Multimedia SystemsSteven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren. 25-36
- Security Flows Analysis of the ATM Emulated LAN ArchitectureMaryline Laurent. 37-52
- Cryptanalysis of a Voting SchemeMarkus Michels, Patrick Horster. 53-59
- Using Workflow to Enhance Security in Federated DatabasesMartin S. Olivier. 60-71
- Anonymous Mobility Management for Third Generation Mobile NetworksSimon Hoff, Kai Jakobs, Dogan Kesdogan. 72-83
- Security Concepts for the WWWPeter Lipp, Vesna Hassler. 84-95
- An Integrated Solution for Secure Communications over B-ISDNJordi Forné, José L. Melús. 96-107
- Network Security in a Telemedicine SystemGeorge Vassilacopoulos, Vassilios Chrissikopoulos, D. Peppes. 108-115
- On the Application of Image Decomposition to Image CompressionHoward Cheng, Xiaobo Li. 116-127
- A New Approach for Delegation Using Hierarchical Delegation TokensYun Ding, Patrick Horster, Holger Petersen. 128-143
- BEAST: A Fast Block Cipher for Arbitrary BlocksizesStefan Lucks. 144-153
- A WWW Based Certification Infrastructure for Secure Open Network TransactionsTomas Gustavsson. 154-165
- Distributed Registration and Key Distribution for Online UniversitiesRolf Oppliger, Martin Bracher. 166-175
- Establishing a Key Hierarchy for Conditional Access without EncryptionJörg Schwenk. 176-182
- Cybermoney in the Internet: An Overview over new Payment Systems in the InternetRüdiger Grimm, Kambiz Zangeneh. 183-195
- A Restrictive Blind Signature Scheme with Applications to Electronic CashCristian Radu, René Govaerts, Joos Vandewalle. 196-207
- Secure Billing - Incontestable ChargingStefan Pütz. 208-221
- ISDN LAN Access: Remote Access Security and User Profile ManagementReinhard Posch, Herbert Leitold, Franz Pucher. 222-233
- Secure World Wide Web Access to Server GroupsA. Hutchison, Matthias Kaiserswerth, Peter Trommler. 234-243
- Access Control System Using Dynamic Handwriting FeaturesChristiane Schmidt. 244-255
- Is there a Need for New Information Security Models?Spyros Kokolakis. 256-267
- Attack Modelling in Open Network EnvironmentsSokratis K. Katsikas, Dimitris Gritzalis, Paul G. Spirakis. 268-277
- The Intrusion Detection System AID - Architecture, and Experiences in Automated Audit AnalysisMichael Sobirey, Birk Richter, Hartmut König. 278-290
- Defending Networks: The Expert System Components of SECURENETSokratis K. Katsikas, N. Theodoropoulos. 291-302
- Increasing Firewall Reliability by Recording RoutesPaul M. Boshoff, Martin S. Olivier. 303-314