2. ICICS 1999:
Language Based Approach to Security
Electronic Commerce and Secret Sharing
: Protecting Critical Information Systems (Abstract).
: Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards.
: Send Message into a Definite Future.
Complexity and Security Functions