Abstract is missing.
- Security On ATM NetworksStelios Karanastasis, Ahmed Patel. 3-20
- ISDN Security servicesHerbert Leitold, Karl C. Posch, Reinhard Posch. 21-35
- An Alternative Access Control Architecture for IP over ATM NetworksOlivier Paul, Maryline Laurent. 36-52
- Verifiable DemocracyYvo Desmedt, Brian King. 53-70
- Efficient Oblivious Proofs of Correct ExponentiationMarkus Jakobsson, Claus-Peter Schnorr. 71-86
- Weaknesses in EHA Authentication and Key Distribution ProtocolMartin Stanek, Daniel Olejar. 87-95
- Formal Design of Efficient Authentication and Key-AgreementGunnar Jacobson. 96-116
- On Authentication, Digital Signatures and Signature LawsPer Kaijser. 117-132
- Watermarking and Secure Distribution for Encrypted VideoThumrongrat Amornraksa, David R. B. Burgess, Peter Sweeney. 131-142
- Implementing a Secure Log File Download Manager for the Java CardConstantinos Markantonakis, Simeon Xenitellis. 143-162
- Protecting Key Exchange and Management Protocols Against Resource Clogging AttacksRolf Oppliger. 163-175
- Secure Distributed Virtual ConferencingWilliam A. Adamson, C. J. Antonelli, Kevin Coffman, Patrick Drew McDaniel, Jim Rees. 176-190
- PIM -SM Security: Interdomain Issues and SolutionsThomas Hardjono, Brad Cain. 191-208
- Attacks against the WAP WTLS protocolMarkku-Juhani Olavi Saarinen. 209-215
- A New Authentication Protocol for Portable Communication SystemsSheng-Bo Xu, Cees Jansen, Henk C. A. van Tilborg. 216-230
- Token Based Authentication for Handover SecurityYi Cheng, Arne Norefors. 231-246
- How to Security Broadcast a SecretJörg Schwenk. 247-257
- Proofs of Work and Bread Pudding ProtocolsMarkus Jakobsson, Ari Juels. 258-272
- Attack on Liu/Farrell/Boyd Arithmetic Coding Encryption SchemeTakeyuki Uehara, Reihaneh Safavi-Naini. 273-290
- Secure Data- Transfer for Web- Based ApplicationsWolfgang Platzer. 291-302
- Using SESAME to Secure Web Based Applications on an IntranetPaul Ashley, Mark Vandenwauver, Joris Claessens. 303-318