Abstract is missing.
- A protocol improvement for High-bandwidth encryption using non-encrypting Smart CardsRüdiger Weis. 1-10
- Real-time Risk Analysis on the Internet: a prototypeH. S. Venter, Les Labuschagne, Jan H. P. Eloff. 11-28
- A practical approach to manage data communication securityP. H. Samwel, Marcel E. M. Spruit. 29-40
- The Future of Australian & New Zealand Security Standard AS/NZS 4444?Matthew J. Warren, William Hutchinson. 41-50
- The Effective Utilization of Audit Logs in Information Security ManagementWerner Olivier, Rossouw von Solms. 51-62
- An approach to standardizing security analysis methods for virtual systemsAnn Frisinger, Louise Yngström. 63-74
- Information Security at Top Level - Securometer® streamlines management informationAndré Buren, Bert van der Meer, Abbas Shahim, Willem Barnhoorn, Edo Roos Lindereen. 75-88
- Risk analysis on Internet connectionMarcel E. M. Spruit, P. H. Samwel. 89-102
- A Secure Station for Network Monitoring and ControlVassilis Prevelakis. 103-116
- Security aspects of a Java-servlet-based web-hosted e-mail systemEleanor Hepworth, Ulrich Ultes-Nitsche. 117-130
- Time as an Aid to Improving Security in Smart CardsVincent Cordonnier, Anthony Watson, Sergiy Nemchenko. 131-144
- The Intranet Authorization ParadigmMark Vandenwauver, Paul Ashley, Gary Gaskell. 145-160
- Predicting the Performance of Transactional Electronic Commerce ProtocolsMatthem Berry, Andrew Hutchison, Elton Saul. 161-178
- The Cyber-Posture of the National Information InfrastructureWillis H. Ware. 179-204
- Principles of Iris RecognitionMichael Negin, Machiel van der Harst. 205-212
- Designing a Secure System for Implementing Chip Cards in the Financial Services IndustryTerry Stanley. 213-220
- New models for the management of public key infrastructure and root certification authoritiesStephen Wilson. 221-230
- A Secure Electronic Commerce Environment: Only with Smart Cards William J. Caelli. 231-242