: Anonymous Networking and Virtual Intranets: Tools for Anonymous Corporations.
David Paul Maher
: Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective.
Louis C. Guillou
: Some Critical Remarks on "Dynamic Data Authentication" as Specified in EMV'96.
: Single-Chip Implementation of a Cryptosystem for Financial Applications.
: On the Continuum Between On-line and Off-line E-cash Systems - 1.
Peter P. Swire
: The Uses and Limits of Financial Cryptography: A Law Professor's Perspective.
: Alternative Visions for Legal Signatures and Evidence.
: Strategic Tasks for Government in the Information Age.