Abstract is missing.
- Strong and Robust RFID Authentication Enabling Perfect Ownership TransferChae Hoon Lim, Taekyoung Kwon. 1-20 [doi]
- A Robust and Secure RFID-Based Pedigree System (Short Paper)Chiu Chiang Tan, Qun Li. 21-29 [doi]
- A Topological Condition for Solving Fair Exchange in Byzantine EnvironmentsBenoît Garbinato, Ian Rickebusch. 30-49 [doi]
- A Security Analysis of the Precise Time Protocol (Short Paper)Jeanette Tsang, Konstantin Beznosov. 50-59 [doi]
- An Identity-Based Proxy Signature Scheme from PairingsKyung-Ah Shim. 60-71 [doi]
- Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks (Short Paper)Huafei Zhu, Jianying Zhou. 72-81 [doi]
- Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)Guomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng. 82-91 [doi]
- Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext SizeTatsuyuki Matsushita, Hideki Imai. 92-111 [doi]
- Trace-Driven Cache Attacks on AES (Short Paper)Onur Aciiçmez, Çetin Kaya Koç. 112-121 [doi]
- A Construction for General and Efficient Oblivious Commitment Based Envelope ProtocolsJiangtao Li, Ninghui Li. 122-138 [doi]
- Defining and Measuring Policy Coverage in Testing Access Control PoliciesEvan Martin, Tao Xie, Ting Yu. 139-158 [doi]
- Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper)Ziqing Mao, Ninghui Li, William H. Winsborough. 159-173 [doi]
- An Operating System Design for the Security Architecture for MicroprocessorsJörg Platte, Raúl Durán Díaz, Edwin Naroska. 174-189 [doi]
- Point-Based Trust: Define How Much Privacy Is WorthDanfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia. 190-209 [doi]
- Efficient Protocols for Privacy Preserving Matching Against Distributed DatasetsYingpeng Sang, Hong Shen, Yasuo Tan, Naixue Xiong. 210-227 [doi]
- Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper)Karsten Nohl, David Evans. 228-237 [doi]
- An Anonymous Authentication Scheme for Identification CardHe Ge. 238-248 [doi]
- A Wireless Covert Channel on Smart Cards (Short Paper)Geir Olav Dyrkolbotn, Einar Snekkenes. 249-259 [doi]
- From Proxy Encryption Primitives to a Deployable Secure-Mailing-List SolutionHimanshu Khurana, Jin Heo, Meenal Pant. 260-281 [doi]
- Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper)Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro. 282-291 [doi]
- An Independent Function-Parallel Firewall Architecture for High-Speed Networks (Short Paper)Errin W. Fulp. 292-301 [doi]
- Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case ScenarioOleksiy Mazhelis, Seppo Puuronen, Mika Raento. 302-321 [doi]
- An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper)Lingli Deng, Yeping He, Ziyao Xu, ChunYang Yuan. 322-331 [doi]
- Provably Correct Runtime Enforcement of Non-interference PropertiesV. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar. 332-351 [doi]
- An Attack on SMC-Based Software ProtectionYongdong Wu, Zhigang Zhao, Tian Wei Chui. 352-368 [doi]
- Modular Behavior Profiles in Systems with Shared Libraries (Short Paper)Carla Marceau, Matthew Stillerman. 369-378 [doi]
- Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to MagicYves Younan, Wouter Joosen, Frank Piessens. 379-398 [doi]
- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart CardsGuilin Wang, Feng Bao. 399-409 [doi]
- Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)Kyung-Ah Shim, Seung-Hyun Seo. 410-419 [doi]
- Seifert s RSA Fault Attack: Simplified Analysis and GeneralizationsJames A. Muir. 420-434 [doi]
- The Fairness of Perfect Concurrent SignaturesGuilin Wang, Feng Bao, Jianying Zhou. 435-451 [doi]
- Secure Set Membership Using 3SatMichael de Mare, Rebecca N. Wright. 452-468 [doi]
- Left-to-Right Signed-Bit ::::tau::::-Adic Representations of ::::n:::: Integers (Short Paper)Billy Bob Brumley. 469-478 [doi]
- Universal Designated Verifier Signature Without DelegatabilityXinyi Huang, Willy Susilo, Yi Mu, Wei Wu. 479-498 [doi]
- Tracing HTTP Activity Through Non-cooperating HTTP Proxies (Short Paper)Richard J. Edell, Peter Kruus, Uri Meth. 499-506 [doi]
- A Fast RSA Implementation on Itanium 2 ProcessorKazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh. 507-518 [doi]
- Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)Haodong Wang, Qun Li. 519-528 [doi]
- Threshold Implementations Against Side-Channel Attacks and GlitchesSvetla Nikova, Christian Rechberger, Vincent Rijmen. 529-545 [doi]
- Hardware-and-Software-Based Security Architecture for Broadband Router (Short Paper)Xiaozhuo Gu, Yufeng Li, Jianzu Yang, Julong Lan. 546-555 [doi]