Abstract is missing.
- Secure Books: Protecting the Distribution of KnowledgeRoss J. Anderson, Václav Matyás Jr., Fabien A. P. Petitcolas, Iain E. Buchan, Rudolf Hanka. 1-11
- Protocols Using Anonymous Connections: Mobile ApplicationsMichael G. Reed, Paul F. Syverson, David M. Goldschlag. 13-23
- Receipt-Free Electronic Voting Schemes for Large Scale ElectionsTatsuaki Okamoto. 25-35
- Flexible Internet Secure Transactions Based on Collaborative DomainsEduardo Solana, Jürgen Harms. 37-51
- How to Build Evidence in a Public-Key Infrastructure for Multi-domain EnvironmentsBruno Crispo. 53-65
- On Signature Schemes with Threshold Verification Detecting Malicious VerifiersHolger Petersen, Markus Michels. 67-78
- Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public KeysStefan Lucks. 79-90
- Protocol Interactions and the Chosen Protocol AttackJohn Kelsey, Bruce Schneier, David Wagner. 91-104
- Binding Bit Patterns to Real World EntitiesBruce Christianson, James A. Malcolm. 105-113
- Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient FaultsFeng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, Teow-Hin Ngair. 115-124
- Low Cost Attacks on Tamper Resistant DevicesRoss J. Anderson, Markus G. Kuhn. 125-136
- Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric TechniquesSimon Blake-Wilson, Alfred Menezes. 137-158
- SG Logic- A Formal Analysis Technique for Authentication ProtocolsSigrid Gürgens. 159-176
- How to Convert any Digital Signature Scheme into a Group Signature SchemeHolger Petersen. 177-190
- Threshold Key-Recovery Systems for RSATatsuaki Okamoto. 191-200
- A Weakness of the Menezes-Vanstone CryptosystemKlaus Kiefer. 201-206
- On Ideal Non-perfect Secret Sharing SchemesPascal Paillier. 207-216