Abstract is missing.
- A Fast Square Root Computation Using the Frobenius MappingFeng Wang, Yasuyuki Nogami, Yoshitaka Morikawa. 1-10 [doi]
- A Forward-Secure Blind Signature Scheme Based on the Strong RSA AssumptionDang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim. 11-21 [doi]
- Secure Route Structures for the Fast Dispatch of Large-Scale Mobile AgentsYan Wang, Chi-Hung Chi, Tieyan Li. 22-33 [doi]
- On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RSTDuncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei. 34-46 [doi]
- A Policy Based Framework for Access ControlRicardo Nabhen, Edgard Jamhour, Carlos Maziero. 47-59 [doi]
- Trading-Off Type-Inference Memory Complexity against CommunicationKonstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine. 60-71 [doi]
- Security Remarks on a Group Signature Scheme with Member DeletionGuilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng. 72-83 [doi]
- An Efficient Known Plaintext Attack on FEA-MHongjun Wu, Feng Bao, Robert H. Deng. 84-87 [doi]
- An Efficient Public-Key FrameworkJianying Zhou, Feng Bao, Robert H. Deng. 88-99 [doi]
- ROCEM: Robust Certified E-mail System Based on Server-Supported SignatureJong-Phil Yang, Chul Sur, Kyung Hyune Rhee. 100-111 [doi]
- Practical Service Charge for P2P Content DistributionJose Antonio Onieva, Jianying Zhou, Javier Lopez. 112-123 [doi]
- ICMP Traceback with Cumulative Path, an Efficient Solution for IP TracebackHenry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma. 124-135 [doi]
- A Lattice Based General Blind Watermark SchemeYongliang Liu, Wen Gao, Zhao Wang, Shaohui Liu. 136-144 [doi]
- Role-Based Access Control and the Access Control MatrixGregory Saunders, Michael Hitchens, Vijay Varadharajan. 145-157 [doi]
- Broadcast Encryption Schemes Based on the Sectioned Key TreeMiodrag J. Mihaljevic. 158-169 [doi]
- Research on the Collusion EstimationGang Li, Jie Yang. 170-178 [doi]
- Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT DomainsMohsen Ashourian, Yo-Sung Ho. 179-190 [doi]
- Protocols for Malicious Host RevocationOscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné. 191-201 [doi]
- A DWT-Based Digital Video Watermarking Scheme with Error Correcting CodePat Pik-Wah Chan, Michael R. Lyu. 202-213 [doi]
- A Novel Two-Level Trust Model for GridTieyan Li, Huafei Zhu, Kwok-Yan Lam. 214-225 [doi]
- Practical t-out-n Oblivious Transfer and Its ApplicationsQianhong Wu, Jianhong Zhang, YuMin Wang. 226-237 [doi]
- Adaptive Collusion Attack to a Block Oriented Watermarking SchemeYongdong Wu, Robert H. Deng. 238-248 [doi]
- ID-Based Distributed Magic Ink Signature from PairingsYan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim. 249-259 [doi]
- A Simple Anonymous Fingerprinting Scheme Based on Blind SignatureYan Wang, Shuwang Lü, Zhenhua Liu. 260-268 [doi]
- Compact Conversion Schemes for the Probabilistic OW-PCA PrimitivesYang Cui, Kazukuni Kobara, Hideki Imai. 269-279 [doi]
- A Security Verification Method for Information Flow Security Policies Implemented in Operating SystemsXiaodong Yi, Xuejun Yang. 280-291 [doi]
- A Novel Efficient Group Signature Scheme with Forward SecurityJianhong Zhang, Qianhong Wu, YuMin Wang. 292-300 [doi]
- Variations of Diffie-Hellman ProblemFeng Bao, Robert H. Deng, Huafei Zhu. 301-312 [doi]
- A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector MachineTaeshik Shon, Jung-Taek Seo, Jongsub Moon. 313-324 [doi]
- A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector MachineMin Luo, Lina Wang, Huanguo Zhang, Jin Chen. 325-336 [doi]
- UC-RBAC: A Usage Constrained Role-Based Access Control ModelZhen Xu, Dengguo Feng, Lan Li, Hua Chen. 337-347 [doi]
- (Virtually) Free Randomization Techniques for Elliptic Curve CryptographyMathieu Ciet, Marc Joye. 348-359 [doi]
- An Optimized Multi-bits Blind Watermarking SchemeXiaoqiang Li, Xiangyang Xue, Wei Li. 360-369 [doi]
- A Compound Intrusion Detection ModelJianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han. 370-381 [doi]
- An Efficient Convertible Authenticated Encryption Scheme and Its VariantHui-Feng Huang, Chin-Chen Chang. 382-392 [doi]
- Space-Economical Reassembly for Intrusion Detection SystemMeng Zhang, Jiubin Ju. 393-404 [doi]
- A Functional Decomposition of Virus and Worm ProgramsJ. Krishna Murthy. 405-414 [doi]