Abstract is missing.
- Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption SchemesLuan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker. 1-12 [doi]
- A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext LengthKeita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi. 13-23 [doi]
- RSA-Based Certificateless Public Key EncryptionJunzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou. 24-34 [doi]
- Strongly Unforgeable ID-Based Signatures without Random OraclesChifumi Sato, Takeshi Okamoto, Eiji Okamoto. 35-46 [doi]
- On the Security of a Certificate-Based Signature Scheme and Its Improvement with PairingsJianhong Zhang. 47-58 [doi]
- An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP SystemsRuishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang. 59-70 [doi]
- Reconstructing a Packed DLL Binary for Static AnalysisXianggen Wang, Dengguo Feng, Purui Su. 71-82 [doi]
- Static Analysis of a Class of Memory Leaks in TrustedBSD MAC FrameworkXinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang. 83-92 [doi]
- Efficient Concurrent npoly(logn)-Simulatable Argument of KnowledgeGuifang Huang, Dongdai Lin, Yanshuo Zhang. 93-101 [doi]
- New Constructions for Reusable, Non-erasure and Universally Composable CommitmentsHuafei Zhu. 102-111 [doi]
- Certificateless Hybrid SigncryptionFagen Li, Masaaki Shirase, Tsuyoshi Takagi. 112-123 [doi]
- On Non-representable Secret Sharing MatroidsQi Cheng, Yong Yin, Kun Xiao, Ching-Fang Hsu. 124-135 [doi]
- A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm OptimizationShaomin Zhu, Jianming Liu. 136-146 [doi]
- Defending against the Pirate Evolution AttackHongxia Jin, Jeffrey B. Lotspiech. 147-158 [doi]
- Security Specification for Conversion Technologies of Heterogeneous DRM SystemsHeasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won. 159-170 [doi]
- Analysing Protocol ImplementationsAnders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven. 171-182 [doi]
- Measuring AnonymityXiaojuan Cai, Yonggen Gu. 183-194 [doi]
- A Hybrid E-Voting SchemeKun Peng. 195-206 [doi]
- A Framework for Authenticated Key Exchange in the Standard ModelShuhua Wu, Yuefei Zhu. 207-218 [doi]
- Secret Handshake: Strong Anonymity Definition and ConstructionYutaka Kawai, Kazuki Yoneyama, Kazuo Ohta. 219-229 [doi]
- An Extended Authentication and Key Agreement Protocol of UMTSFarshid Farhat, Somayeh Salimi, Ahmad Salahi. 230-244 [doi]
- Hash-Based Key Management Schemes for MPEG4-FGSMohamed Karroumi, Ayoub Massoudi. 245-256 [doi]
- Twister- A Framework for Secure and Fast Hash FunctionsEwan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks. 257-273 [doi]
- Preimage Attack on Hash Function RIPEMDGaoli Wang, Shaohui Wang. 274-284 [doi]
- Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVALHongbo Yu, Xiaoyun Wang. 285-297 [doi]
- Memoryless Related-Key Boomerang Attack on the Full Tiger Block CipherEwan Fleischmann, Michael Gorski, Stefan Lucks. 298-309 [doi]
- Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2Ewan Fleischmann, Michael Gorski, Stefan Lucks. 310-323 [doi]
- Some New Observations on the SMS4 Block Cipher in the Chinese WAPI StandardWentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su. 324-335 [doi]
- On the Correctness of an Approach against Side-Channel AttacksPeng Wang, Dengguo Feng, Wenling Wu, Liting Zhang. 336-344 [doi]
- Ranking Attack Graphs with Graph Neural NetworksLiang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi. 345-359 [doi]
- Implementing IDS Management on Lock-KeeperFeng Cheng 0002, Sebastian Roschke, Christoph Meinel. 360-371 [doi]
- Ensuring Dual Security Modes in RFID-Enabled Supply Chain SystemsShaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng. 372-383 [doi]
- Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted ComputingYanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu. 384-395 [doi]
- Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information SharingHans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy. 396-407 [doi]