Abstract is missing.
- PorKI: Portable PKI Credentials via Proxy CertificatesMassimiliano Pala, Sara Sinclair, Sean W. Smith. 1-16 [doi]
- A New Revocable Secret Handshake Scheme with Backward UnlinkabilityYamin Wen, Fangguo Zhang. 17-30 [doi]
- SOMA: Self-Organised Mesh AuthenticationFoivos F. Demertzis, Christos Xenakis. 31-44 [doi]
- A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing EnvironmentsJangseong Kim, Joonsang Baek, Kwangjo Kim, Jianying Zhou. 45-60 [doi]
- Searchable Encryption for Outsourced Data AnalyticsFlorian Kerschbaum, Alessandro Sorniotti. 61-76 [doi]
- An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List SystemKeita Emura, Atsuko Miyaji, Kazumasa Omote. 77-92 [doi]
- E-Voting: A New Approach Using Double-Blind Identity-Based EncryptionDavid Gray, Caroline Sheedy. 93-108 [doi]
- BBox: A Distributed Secure Log ArchitectureRafael Accorsi. 109-124 [doi]
- A Fair and Abuse-Free Contract Signing Protocol from Boneh-Boyen SignatureSomayeh Heidarvand, Jorge L. Villar. 125-140 [doi]
- Attribute Based Signatures for Bounded Multi-level Threshold CircuitsSwarun Kumar, Shivank Agrawal, Subha Balaraman, C. Pandu Rangan. 141-154 [doi]
- User-Centric Identity Management Using Trusted ModulesJan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens. 155-170 [doi]
- Attaching Multiple Personal Identifiers in X.509 Digital CertificatesProkopios Drogkaris, Stefanos Gritzalis. 171-177 [doi]
- Observations on Certification Authority Key CompromiseMoez Ben MBarka, Julien P. Stern. 178-192 [doi]
- An Infrastructure for Long-Term Archiving of Authenticated and Sensitive Electronic DocumentsThiago Acórdi Ramos, Nelson da Silva, Lau Cheuk Lung, Jonathan Gehard Kohler, Ricardo Felipe Custódio. 193-207 [doi]