Abstract is missing.
- Computation of Cryptographic Keys from Face BiometricsAlwyn Goh, David Ngo Chek Ling. 1-13 [doi]
- AUTHMAC_DH: A New Protocol for Authentication and Key DistributionHeba Kamal Aslan. 14-26 [doi]
- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage DetectionAlwyn Goh, David Ngo Chek Ling. 27-39 [doi]
- Securing the Border Gateway Protocol: A Status UpdateStephen T. Kent. 40-53 [doi]
- Towards an IPv6-Based Security Framework for Distributed Storage ResourcesAlessandro Bassi, Julien Laganier. 54-64 [doi]
- Operational Characteristics of an Automated Intrusion Response SystemMaria Papadaki, Steven Furnell, Benn Lines, Paul L. Reynolds. 65-75 [doi]
- A Secure Multimedia System in Emerging Wireless Home NetworksNut Taesombut, Richard Y. Huang, P. Venkat Rangan. 76-88 [doi]
- Java Obfuscation with a Theoretical Basis for Building Secure Mobile AgentsYusuke Sakabe, Masakazu Soshi, Atsuko Miyaji. 89-103 [doi]
- A Security Scheme for Mobile Agent Platforms in Large-Scale SystemsMichelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro. 104-116 [doi]
- Privacy and Trust in Distributed NetworksThomas Rössler, Arno Hollosi. 117-131 [doi]
- Extending the SDSI / SPKI Model through Federation WebsAltair Olivo Santin, Joni da Silva Fraga, Carlos Maziero. 132-145 [doi]
- Trust-Chi: An XML Framework for Trust NegotiationsElisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini. 146-157 [doi]
- How to Specify Security Services: A Practical ApproachJavier Lopez, Juan J. Ortega, José Luis Vivas, José M. Troya. 158-171 [doi]
- Application Level Smart Card Support through Networked Mobile DevicesPierpaolo Baglietto, Francesco Moggia, Nicola Zingirian, Massimo Maresca. 172-180 [doi]
- Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded CoinageAlwyn Goh, Yip Wai Kuan, David Ngo Chek Ling. 181-193 [doi]
- Selective Encryption of the JPEG2000 BitstreamRoland Norcen, Andreas Uhl. 194-204 [doi]
- Robust Spatial Data Hiding for Color ImagesXiaoqiang Li, Xiangyang Xue, Wei Li. 205-213 [doi]
- Watermark Security via Secret Wavelet Packet Subband StructuresWerner Dietl, Andreas Uhl. 214-225 [doi]
- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 CompressionDavid Megías, Jordi Herrera-Joancomartí, Julià Minguillón. 226-238 [doi]
- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-GraphsAlwyn Goh, G. S. Poh, David Ngo Chek Ling. 239-251 [doi]
- Confidential Transmission of Lossless Visual Data: Experimental Modelling and OptimizationBubi G. Flepp-Stars, Herbert Stögner, Andreas Uhl. 252-263 [doi]