Abstract is missing.
- On the security of a structural proven signer ordering multisignature schemeChris J. Mitchell, Namhyun Hur. 1-8
- Renewing crytographic timestampsSattam S. Al-Riyami, Chris J. Mitchell. 9-16
- Implementing elliptic curve cryptographyWolfgang Bauer. 17-28
- A new asymmetric fingerprinting framework based on secret sharingYan Wang, Shuwang Lü, Zhenhua Liu. 29-40
- Authentication of transit flows and k-siblings one-time signatureMohamed Al-Ibrahim, Josef Pieprzyk. 41-55
- Improving the functionality of syn cookiesAndre Zuquete. 57-77
- A mac-layer security architecture for cable networksTadauchi Masaharu, Ishii Tatsuei, Itoh Susumu. 79-90
- Towards authentication using mobile devicesEdgar Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker. 91-105
- Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networksPietro Michiardi, Refik Molva. 107-121
- Enabling adaptive and secure extranetsYves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva. 123-135
- Multiple layer encryption for multicast groupsAlain Pannetrat, Refik Molva. 137-153
- Access control, reverse access control and replication control in a world wide distributed systemBogdan C. Popescu, Chandana Gamage, Andrew S. Tanenbaum. 155-167
- The coras approach for model-based risk management applied to e-commerce domainDimitris Raptis, Theodosis Dimitrakos, Bjørn Axel Gran, Ketil Stølen. 169-181
- Towards security architecture for future active IP networksDusan Gabrijelcic, Arso Savanovic, Borka Jerman-Blazic. 183-195
- Combined fingerprinting attacks against digital audio watermarking: methods, results and solutionsMartin Steinebach, Jana Dittmann, Eva Saar. 197-212
- Selective encryption of visual dataChampskud J. Skrepth, Andreas Uhl. 213-226
- Biometric authentication - security and usabilityVáclav Matyás Jr., Zdenek Ríha. 227-239
- Automatic authentication based on the Austrian citizen cardArno Hollosi, Udo Payer, Reinhard Posch. 241-253
- An open interface enabling secure e-governmentArno Hollosi, Herbert Leitold, Reinhard Posch. 255-266
- Cadenus security considerationsGasper Lavrencic, Borka Jerman-Blazic, Aleksej Jerman Blazic. 267-278
- Validation of long-term signaturesKarl Scheibelhofer. 279-292
- Digital signatures and electronic documents: a cautionary taleK. Kain, Sean W. Smith, R. Asokan. 293-308