Key Distribution
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures
Privacy Amplification Theorem for Noisy Main Channel
Protocols
Efficient Kerberized Multicast in a Practical Distributed Setting
Suitability of a Classical Analysis Method for E-commerce Protocols
Enhancing Technologies
Hyppocrates (A New Proactive Password Checker)
Lenient/Strict Batch Verification in Several Groups
Privacy
Absolute Privacy in Voting
Johann-Christoph Freytag (Humboldt-Universitiit zu Berlin)
A Logical Model for Privacy Protection
Stanley Chow, Yuan Gu, Harold Johnson ( Cloakware Corporation),
Message Hiding I
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
Robust New Method in Frequency Domain Watermarking
PKI Issues and Protocols
On the Complexity of Public-Key Certificate Validation
Liability of Certification Authorities: A Juridical Point of View
Hardware Implementations
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board
Elliptic Curve Arithmetic Using SIMD
……
Cryptanalysis and aPrevention
Implementaivns
Non-repudiation Techniqnes
Contrasfs and Anctions
Message HidingII
Paytrents
Security APpliications
Network and OS Security
Author Index