Abstract is missing.
- The State of Hash Functions and the NIST SHA-3 CompetitionBart Preneel. 1-11 [doi]
- Key Evolution Systems in Untrusted Update EnvironmentsBenoît Libert, Jean-Jacques Quisquater, Moti Yung. 12-21 [doi]
- Secure and Privacy-Preserving Information BrokeringPeng Liu. 22 [doi]
- Provably Secure Convertible Nominative Signature SchemeWei Zhao, Changlu Lin, Dingfeng Ye. 23-40 [doi]
- Cryptanalysis of Two Ring Signcryption SchemesHuaqun Wang, Hong Yu. 41-46 [doi]
- Efficient Signcryption Key Encapsulation without Random OraclesFagen Li, Masaaki Shirase, Tsuyoshi Takagi. 47-59 [doi]
- Strong Anonymous SignaturesRui Zhang 0002, Hideki Imai. 60-71 [doi]
- Publicly Verifiable Privacy-Preserving Group DecryptionBo Qin, Qianhong Wu, Willy Susilo, Yi Mu. 72-83 [doi]
- Privacy for Private Key in SignaturesQianhong Wu, Bo Qin, Yi Mu, Willy Susilo. 84-95 [doi]
- Security of Truncated MACsPeng Wang, Dengguo Feng, Changlu Lin, Wenling Wu. 96-114 [doi]
- Security Analysis of Multivariate Polynomials for HashingLuk Bettale, Jean-Charles Faugère, Ludovic Perret. 115-124 [doi]
- SPVT-II: An Efficient Security Protocol Verifier Based on Logic ProgrammingMengjun Li, Ti Zhou, Zhoujun Li. 125-140 [doi]
- Batch ZK Proof and Verification of OR LogicKun Peng, Feng Bao. 141-156 [doi]
- Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPsDebra L. Cook, Moti Yung, Angelos D. Keromytis. 157-180 [doi]
- Impossible Differential Analysis of Reduced Round CLEFIAWenying Zhang, Jing Han. 181-191 [doi]
- Reducible Polynomial over F::2:: Constructed by Trinomial sigma-LFSRGuang Zeng, Yang Yang, Wenbao Han, Shuqin Fan. 192-200 [doi]
- Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard ModelPiyi Yang, Zhenfu Cao, Xiaolei Dong. 201-216 [doi]
- Further Observations on Certificateless Public Key EncryptionXu an Wang, Xinyi Huang, Xiaoyuan Yang. 217-239 [doi]
- Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile ComputingMooseop Kim, Jaecheol Ryou, SungIk Jun. 240-252 [doi]
- New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPADuo Liu, Zhiyong Tan, Yiqi Dai. 253-264 [doi]
- A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSNBo-Chao Cheng, Huan Chen, Guo-Tan Liao. 265-274 [doi]
- Key Predistribution Schemes Using Codes in Wireless Sensor NetworksSushmita Ruj, Bimal K. Roy. 275-288 [doi]
- Efficient Multi-PKG ID-Based Signcryption for Ad Hoc NetworksFagen Li, Masaaki Shirase, Tsuyoshi Takagi. 289-304 [doi]
- On the Computational Efficiency of XTR+Ningbo Mu, Yupu Hu, Leyou Zhang. 305-313 [doi]
- A Variant of Boneh-Gentry-Hamburg s Pairing-Free Identity Based Encryption SchemeMahabir Prasad Jhanwar, Rana Barua. 314-331 [doi]
- Inter-domain Identity-Based Proxy Re-encryptionQiang Tang, Pieter H. Hartel, Willem Jonker. 332-347 [doi]
- Hardening Botnet by a Rational BotmasterZonghua Zhang, Ruo Ando, Youki Kadobayashi. 348-369 [doi]
- Separation of Duty in Trust-Based CollaborationLingli Deng, Yeping He, Ziyao Xu. 370-388 [doi]
- An Integrity Assurance Mechanism for Run-Time ProgramsZiyao Xu, Yeping He, Lingli Deng. 389-405 [doi]
- A Security and Performance Evaluation of Hash-Based RFID ProtocolsTong-Lee Lim, Tieyan Li, Yingjiu Li. 406-424 [doi]
- Correction, Optimisation and Secure and Efficient Application of PBD ShufflingKun Peng, Feng Bao. 425-437 [doi]