Abstract is missing.
- Collecting randomness from the netB. Bencsath, I. Vajda.
- Secure Meeting Scheduling with agenTAT. Herlea, Joris Claessens, Danny De Cock, Bart Preneel, Joos Vandewalle.
- Tree-based Key Agreement for MulticastTobias Martin, R. Schaffelhofer, Jörg Schwenk.
- Optimization of Watermarking Performances Using Error Correcting Codes and RepetitionS. Zinger, Z. Jin, Henri Maître, Bülent Sankur.
- Security for the core network of third generation mobile systemsRoland Schmitz.
- Deployment of Electronic Signatures in the XML world according to the international standard XML Signature Syntax and ProcessingG. Karlinger.
- Blind Compressed-Domain Watermarking for MPEG-Encoded VideosWennung Lie, Chih-Liang Wu.
- Using Raw Speeck as a Watermark, does it work?P. Nintanavongsa, Thumrongrat Amornraksa.
- ACLA: A framework for Access Control List (ACL) Analysis and OptimizationJ. Qian.
- Secure iLearningF. Graf.
- Transparent Access To Encrypted Data Using Operating System Network Stack ExtensionsE. Rademer, Stephen D. Wolthusen.
- Secure Service Centered Networking for Nomadic UsageMatthias Hollick.
- Asynchronous Large-Scale Certification Based on Certificate Verification TreesM. Mar Albà, Josep Domingo-Ferrer, Francesc Sebé.
- System Security Assessment through Specification Mutations and Fault InjectionRauli Kaksonen, M. Laakso, A. Takanen.
- Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket ConceptStefan Katzenbeisser, Scott Craver.
- Scalable Detection of Perceptual Watermarks in JPEG2000 ImagesDimitrios Simitopoulos, Nikolaos V. Boulgouris, Athanasios Leontaris, Michael G. Strintzis.
- An integrated secure Web architecture for protected mobile code distributionMehrdad Jalali.
- Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic SequencesSofia Tsekeridou, Vassilios Solachidis, Nikos Nikolaidis, Athanasios Nikolaidis, Anastasios Tefas, Ioannis Pitas.
- A Modified Chaotic Cryptographic MethodW. Wong, L. Lee, K. Wong.
- A Key Transport Protocol Based on Secret Sharing - An Application to Message AuthenticationAhmet M. Eskicioglu.
- Transferability in Coin Systems with ObserversC. Fremidt.
- Encryption System Based on Neutral NetworkChoi-Kuen Chan, Chi-Kwong Chan, Lee-Ming Cheng.
- Secure and anonymous multicast frameworkNathalie Weiler, Bernhard Plattner.
- Counterfeit Attacks against a new Currency Protection SchemeAlexander Herrigel, Sviatoslav Voloshynovskiy.
- Quantization Watermarking in the JPEG2000 Coding PipelinePeter Meerwald.
- Vulnerabilities and Security Limitations of current IP Telephony SystemsRalf Ackermann, Markus Schumacher, Utz Roedig, Ralf Steinmetz.
- Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood RetrievalRapee Puertpan.
- Secure Internet PhonePatrick Horster, Martin Schaffer, Peter Schartner, Dieter Sommer.
- Virtual Hidden NetworkN. Shin.
- Fingerprints for Copyright ProtectionSylvia B. Encheva.
- A PC Cryptographic Coprocessor based on TI Signal Processor and Smart Card SystemMilan Markovic, Z. Savic, Zeljko Obrenovic, A. Nikolic.
- What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and VerificationKarl Scheibelhofer.
- Large Scale distributed watermarking of multicast media through encryptionRoland Parviainen, Peter Parnes.
- Conditional Access for Business and M-Commerce Applications using Annotation WatermarksJana Dittmann, Petra Wohlmacher, Ralf Ackermann.
- An Elliptic Curve Random Number GeneratorL. Lee, K. Wong.