Abstract is missing.
- Multicast-specific security threats and counter-measuresTony Ballardie, Jon Crowcroft. 2-16 [doi]
- Design of a key agile cryptographic system for OC-12c rate ATMDaniel S. Stevenson, Nathan Hillery, Gregory T. Byrd, Fengmin Gong, Dan Winkelstein. 17-30 [doi]
- IpAccess-an Internet service access system for firewall installationsSteffen Stempel. 31-46 [doi]
- Trusted distribution of software over the InternetAviel D. Rubin. 47-53 [doi]
- Location-independent information object securityJohn C. Lowry. 54-63 [doi]
- Electronic cash on the InternetStefan Brands. 64-84 [doi]
- Panel - Internet Payment Mechanisms: Requirements and ArchitecturesRavi Ganesan. 85-86 [doi]
- NERD: Network Event Recording Device: an automated system for network anomaly detection and notificationDavid G. Simmons, Ronald Wilkins. 87-93 [doi]
- An overview of SNIF: a tool for Surveying Network Information FlowJim Alves-Foss. 94-101 [doi]
- Distributed audit trail analysisAbdelaziz Mounji, Baudouin Le Charlier, D. ZampuniƩris, Naji Habra. 102-113 [doi]
- SESAME V2 public key and authorisation extensions to KerberosP. V. McMahon. 114-131 [doi]
- Yaksha: augmenting Kerberos with public key cryptographyRavi Ganesan. 132-143 [doi]
- GSS-API security for ONC RPCB. Jaspan. 144-152 [doi]
- A Certificate Management System: structure, functions and protocolsNada Kapidzic, Alan Davidson. 153-160 [doi]
- PEMToolKit: building a top-down certification hierarchy for PEM from the bottom upAlireza Bahreman. 161-171 [doi]
- A new approach to the X.509 framework: allowing a global authentication infrastructure without a global trust modelSuzan Mendes, Christian Huitema. 172-190 [doi]
- Panel: Security Issues for Mosaic and the World Wide WebFrederick M. Avolio. 191 [doi]