Martin S. Olivier Using Workflow to Enhance Security in Federated Databases. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:60-71 [Conf]
Howard Cheng, Xiaobo Li On the Application of Image Decomposition to Image Compression. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:116-127 [Conf]
Stefan Lucks BEAST: A Fast Block Cipher for Arbitrary Blocksizes. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:144-153 [Conf]
Tomas Gustavsson A WWW Based Certification Infrastructure for Secure Open Network Transactions. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:154-165 [Conf]
Jörg Schwenk Establishing a Key Hierarchy for Conditional Access without Encryption. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:176-182 [Conf]
Rüdiger Grimm, Kambiz Zangeneh Cybermoney in the Internet: An Overview over new Payment Systems in the Internet. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:183-195 [Conf]
Christiane Schmidt Access Control System Using Dynamic Handwriting Features. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:244-255 [Conf]
Spyros Kokolakis Is there a Need for New Information Security Models? [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1996, pp:256-267 [Conf]