Abstract is missing.
- Efficient Protocols for Signing Routing MessagesKan Zhang. [doi]
- Live Traffic Analysis of TCP/IP GatewaysPhillip A. Porras, Alfonso Valdes. [doi]
- Le Nozze di NomenRobert Blakley. [doi]
- Attack Detection Methods for All-Optical NetworksMuriel Médard, Douglas Marquis, Stephen R. Chinn. [doi]
- The Multilayer FirewallDan M. Nessett, Polar Humenn. [doi]
- Credential Management and Secure Single Login for SPKMDetlef Hühnlein. [doi]
- Automated Recovery in a Secure Bootstrap ProcessWilliam A. Arbaugh, Angelos D. Keromytis, David J. Farber, Jonathan M. Smith. [doi]
- Enabling the Internet White Pages Service - the Directory GuardianDavid W. Chadwick, Andrew J. Young. [doi]
- Implementation Issues for E-CommerceB. Clifford Neuman. [doi]
- Trust Management and Internet Client SecurityBlair Dillaway. [doi]
- An Intermediate System s View of IPSECCheryl Madson. [doi]
- Implementing Protection Domains in the Java:::TM::: Development Kit 1.2Li Gong, Roland Schemers. [doi]
- VPN and IPsecNaganand Doraswamy. [doi]
- What Will Probably HappenDan McDonald. [doi]
- Some Timestamping Protocol FailuresMike Just. [doi]
- Weak links in e-commerce security: examples from the fieldGary McGraw. [doi]
- On the Problem of Trust in Mobile Agent SystemsUwe G. Wilhelm, Sebastian Staamann, Levente Buttyán. [doi]
- Some TipsDonald E. Eastlake III. [doi]
- The Secure Remote Password ProtocolThomas D. Wu. [doi]
- Distributed Algorithms for Attack Localization in All-Optical NetworksRuth Bergman, Muriel Médard, Serena Chan. [doi]