Abstract is missing.
- Fixed vs. Variable-Length Patterns for Detecting Suspicious Process BehaviorHervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi. 1-15 [doi]
- A Tool for Pro-active Defense Against the Buffer Overrun AttackDanilo Bruschi, Emilia Rosti, R. Banfi. 17-31 [doi]
- A Kernelized Architecture for Multilevel Secure Application PoliciesSimon N. Foley. 33-49 [doi]
- Dealing with Multi-policy Security in Large Open Distributed SystemsChristophe Bidan, Valérie Issarny. 51-66 [doi]
- A Flexible Method for Information System Security Policy SpecificationRodolphe Ortalo. 67-84 [doi]
- On the Security of Some Variants of the RSA Signature SchemeMarkus Michels, Markus Stadler, Hung-Min Sun. 85-96 [doi]
- Side Channel Cryptanalysis of Product CiphersJohn Kelsey, Bruce Schneier, David Wagner, Chris Hall. 97-110 [doi]
- On the Security of Digital TachographsRoss J. Anderson. 111-125 [doi]
- An Authorization Model and Its Formal SemanticsElisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo. 127-142 [doi]
- Authorization in CORBA SecurityGünter Karjoth. 143-158 [doi]
- Rules for Designing Multilevel Object-Oriented DatabasesFrédéric Cuppens, Alban Gabillon. 159-174 [doi]
- Byte Code Verification for Java Smart Card Based on Model CheckingJoachim Posegga, Harald Vogt. 175-190 [doi]
- Towards Formalizing the Java Security Architecture of JDK 1.2Lora Kassab, Steven J. Greenwald. 191-207 [doi]
- EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java AppletsAngelos Varvitsiotis, Despina Polemi, Andy Marsh. 209-220 [doi]
- MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-VideoJean-Paul M. G. Linnartz, Joop Talstra. 221-240 [doi]
- DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed SystemDaniel Augot, Jean-François Delaigle, Caroline Fontaine. 241-255 [doi]
- The "Ticket" Concept for Copy Control Based on Embedded SignallingJean-Paul M. G. Linnartz. 257-274 [doi]
- Panel Session: WatermarkingGérard Eizenberg, Jean-Jacques Quisquater. 275 [doi]
- Authentication and Payment in Future Mobile SystemsGünther Horn, Bart Preneel. 277-293 [doi]
- Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication NetworksDogan Kesdogan, Peter Reichl, Klaus Junghärtchen. 295-312 [doi]
- A Mix-Mediated Anonymity Service and Its PaymentElke Franz, Anja Jerichow. 313-327 [doi]
- A Subjective Metric of AuthenticationAudun Jøsang. 329-344 [doi]
- A Sound Logic for Analysing Electronic Commerce ProtocolsVolker Kessler, Heike Neumann. 345-360 [doi]
- Kerberos Version 4: Inductive Analysis of the Secrecy GoalsGiampaolo Bella, Lawrence C. Paulson. 361-375 [doi]