Abstract is missing.
- A Dynamic Mechanism for Recovering from Buffer Overflow AttacksStelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis. 1-15 [doi]
- SVision: A Network Host-Centered Anomaly Visualization TechniqueIosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani. 16-28 [doi]
- Time-Based Release of Confidential Information in Hierarchical SettingsDeholo Nali, Carlisle M. Adams, Ali Miri. 29-43 [doi]
- Trust Engineering: From Requirements to System Design and Maintenance - A Working National Lottery System ExperienceElisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung. 44-58 [doi]
- A Privacy Preserving Rental SystemYanjiang Yang, Beng Chin Ooi. 59-73 [doi]
- Constant Round Dynamic Group Key AgreementRatna Dutta, Rana Barua. 74-88 [doi]
- A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial DesignDibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy. 89-103 [doi]
- ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear FormsHyung-Mok Lee, Kyung Ju Ha, Kyo-Min Ku. 104-117 [doi]
- On the Notion of Statistical Security in Simulatability DefinitionsDennis Hofheinz, Dominique Unruh. 118-133 [doi]
- Certificateless Public Key Encryption Without PairingJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo. 134-148 [doi]
- Tracing-by-Linking Group SignaturesVictor K. Wei. 149-163 [doi]
- Chaum s Designated Confirmer Signature RevisitedJean Monnerat, Serge Vaudenay. 164-178 [doi]
- ::::gore::::: Routing-Assisted Defense Against DDoS AttacksStephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis. 179-193 [doi]
- IPSec Support in NAT-PT Scenario for IPv6 TransitionSouhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim. 194-202 [doi]
- Hybrid Signcryption Schemes with Outsider SecurityAlexander W. Dent. 203-217 [doi]
- Analysis and Improvement of a Signcryption Scheme with Key PrivacyGuomin Yang, Duncan S. Wong, Xiaotie Deng. 218-232 [doi]
- Efficient and Proactive Threshold SigncryptionChangshe Ma, Kefei Chen, Dong Zheng, Shengli Liu. 233-243 [doi]
- Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?Chris J. Mitchell. 244-258 [doi]
- Hardware Architecture and Cost Estimates for Breaking SHA-1Akashi Satoh. 259-273 [doi]
- On the Security of Tweakable Modes of Operation: TBC and TAEPeng Wang, Dengguo Feng, Wenling Wu. 274-287 [doi]
- A Non-redundant and Efficient Architecture for Karatsuba-Ofman AlgorithmNam Su Chang, Chang-Han Kim, Young-Ho Park, Jongin Lim. 288-299 [doi]
- Compatible Ideal Contrast Visual Cryptography Schemes with ReversingChi-Ming Hu, Wen-Guey Tzeng. 300-313 [doi]
- An Oblivious Transfer Protocol with Log-Squared CommunicationHelger Lipmaa. 314-328 [doi]
- Electronic Voting: Starting Over?Yvo Desmedt, Kaoru Kurosawa. 329-343 [doi]
- Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail SystemYong Ho Hwang, Dae Hyun Yum, Pil Joong Lee. 344-358 [doi]
- Universally Composable Time-Stamping Schemes with AuditAhto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson. 359-373 [doi]
- A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali EncryptionKun Peng, Colin Boyd, Ed Dawson. 374-388 [doi]
- Building a Cryptovirus Using Microsoft s Cryptographic APIAdam Young. 389-401 [doi]
- On the Security of the WinRAR Encryption MethodGary S.-W. Yeo, Raphael Chung-Wei Phan. 402-416 [doi]
- Towards Better Software Tamper ResistanceHongxia Jin, Ginger Myles, Jeffery Lotspiech. 417-430 [doi]
- Device-Enabled Authorization in the Grey-SystemLujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar. 431-445 [doi]
- Evaluating Access Control Policies Through Model CheckingNan Zhang 0003, Mark Ryan, Dimitar P. Guelev. 446-460 [doi]
- A Cryptographic Solution for General Access ControlYibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu. 461-473 [doi]
- Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeitingXiaolan Zhang 0003, Brian King. 474-481 [doi]
- A Formal Definition for Trust in Distributed SystemsDaoxi Xiu, Zhaoyu Liu. 482-489 [doi]
- A Practical Voting Scheme with ReceiptsMarek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski. 490-497 [doi]
- New Constructive Approach to Covert Channel Modeling and Channel Capacity EstimationZhenghong Wang, Ruby B. Lee. 498-505 [doi]
- Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov ModelsGerman Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn. 506-514 [doi]