Networked cryptographic devices resilient to capture Philip MacKenzieMichael K. Reiter Regular contribution 01 November 2003 Pages: 1 - 20
Analysis of e-commerce protocols: Adapting a traditional technique Sigrid GürgensJavier LopezRené Peralta Regular contribution 01 November 2003 Pages: 21 - 36
Zheng and Seberry’s public key encryption scheme revisited Joonsang BaekYuliang Zheng Regular contribution 01 November 2003 Pages: 37 - 44
Content-based filtering of Web documents: the MaX system and the EUFORBIA project Elisa BertinoElena FerrariAndrea Perego Regular contribution 01 November 2003 Pages: 45 - 58
An attack on the isomorphisms of polynomials problem with one secret Willi GeiselmannWilli MeierRainer Steinwandt Regular contribution 01 November 2003 Pages: 59 - 64