Abstract is missing.
- Spending Programs: A Tool for Flexible MicropaymentsJosep Domingo-Ferrer, Jordi Herrera-JoancomartÃ. 1-13 [doi]
- Money Conservation via Atomicity in Fair Off-Line E-CashShouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu. 14-31 [doi]
- Engineering an eCash SystemTim Ebringer, Peter Thorne. 32-36 [doi]
- Unlinkable Electronic Coupon Protocol with Anonymity ControlToru Nakanishi, Nobuaki Haruna, Yuji Sugiyama. 37-46 [doi]
- On the Security of the Lee-Chang Group Signature Scheme and Its DerivativesMarc Joye, Narn-Yih Lee, Tzonelih Hwang. 47-51 [doi]
- Security Properties of Software ComponentsKhaled M. Khan, Jun Han, Yuliang Zheng. 52-56 [doi]
- Methods for Protecting a Mobile Agent s RouteDirk Westhoff, Markus Schneider II, Claus Unger, Firoz Kaderali. 57-71 [doi]
- Non-interactive Cryptosystem for Entity AuthenticationHyung-Woo Lee, Jung-Eun Kim, Tai-Yun Kim. 72-84 [doi]
- Implementation of Virtual Private Networks at the Transport LayerJorge Davila, Javier Lopez, René Peralta. 85-102 [doi]
- Performance Evaluation of Certificate Revocation Using ::::k::::-Valued Hash TreeHiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi. 103-117 [doi]
- Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus AttacksYuji Watanabe, Hideki Imai. 118-135 [doi]
- Highly Robust Image Watermarking Using Complementary ModulationsChun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze. 136-153 [doi]
- Region-Based Watermarking for ImagesGareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona. 154-166 [doi]
- Digital Watermarking Robust Against JPEG CompressionHye-Joo Lee, Ji-Hwan Park, Yuliang Zheng. 167-190 [doi]
- Fingerprints for Copyright Software ProtectionJosef Pieprzyk. 178-190 [doi]
- A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and EncryptionSang Uk Shin, Kyeong Seop Sim, Kyung Hyune Rhee. 191-201 [doi]
- On Anonymous Electronic Cash and CrimeTomas Sander, Amnon Ta-Shma. 202-206 [doi]
- On the Difficulty of Key Recovery SystemsSeungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park. 207-224 [doi]
- An Improvement on a Practical Secret Voting SchemeMiyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto. 225-234 [doi]
- Undeniable Confirmer SignatureKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. 235-246 [doi]
- Extended Proxy Signatures for Smart CardsTakeshi Okamoto, Mitsuru Tada, Eiji Okamoto. 247-258 [doi]
- A New Digital Signature Scheme on ID-Based Key-Sharing InfrastructuresTsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai. 259-270 [doi]
- Cryptanalysis of Two Group Signature SchemesMarc Joye, Seungjoo Kim, Narn-Yih Lee. 271-275 [doi]