Abstract is missing.
- Automating Security Configuration and Administration: An Access Control PerspectiveJaideep Vaidya. 1-9 [doi]
- Security Metrics and Security Investment ModelsRainer Böhme. 10-24 [doi]
- Publishing Upper Half of RSA Decryption ExponentSubhamoy Maitra, Santanu Sarkar, Sourav Sengupta. 25-39 [doi]
- PA1 and IND-CCA2 Do Not Guarantee PA2: Brief ExamplesYamin Liu, Bao Li, Xianhui Lu, Yazhe Zhang. 40-54 [doi]
- A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO ModelYusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta. 55-69 [doi]
- An Improvement of Key Generation Algorithm for Gentry s Homomorphic Encryption SchemeNaoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama. 70-83 [doi]
- Practical Universal Random SamplingMarek Klonowski, Michal Przykucki, Tomasz Struminski, Malgorzata Sulkowska. 84-100 [doi]
- Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality ConstraintsLena Wiese. 101-116 [doi]
- Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN ChannelMinoru Kuribayashi. 117-132 [doi]
- Validating Security Policy Conformance with WS-Security RequirementsFumiko Satoh, Naohiko Uramoto. 133-148 [doi]
- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim EncryptionTakuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto. 149-163 [doi]
- Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key LeakageAtsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama. 164-180 [doi]
- Group Signature Implies PKE with Non-interactive Opening and Threshold PKEKeita Emura, Goichiro Hanaoka, Yusuke Sakai. 181-198 [doi]
- A Generic Binary Analysis Method for MalwareTomonori Izumida, Kokichi Futatsugi, Akira Mori. 199-216 [doi]
- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETsCarlos Miguel Tavares Calafate, Javier Campos, Marga Nácher, Pietro Manzoni, Juan-Carlos Cano. 217-231 [doi]
- Securing MANET Multicast Using DIPLOMAMansoor Alicherry, Angelos D. Keromytis. 232-250 [doi]
- Preimage Attacks against Variants of Very Smooth HashKimmo Halunen, Juha Röning. 251-266 [doi]
- Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message ModificationJun Yajima, Takeshi Shimoyama. 267-284 [doi]
- Mutual Information Analysis under the View of Higher-Order StatisticsThanh-Ha Le, Mael Berthier. 285-300 [doi]
- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ::::ShiftRow:::: ParameterYu Sasaki. 301-315 [doi]
- Differential Addition in Generalized Edwards CoordinatesBenjamin Justus, Daniel Loebenberger. 316-325 [doi]
- Efficient Implementation of Pairing on BREW Mobile PhonesTadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi. 326-336 [doi]
- Introducing Mitigation Use Cases to Enhance the Scope of Test CasesLasse Harjumaa, Ilkka Tervonen. 337-353 [doi]
- Optimal Adversary Behavior for the Serial Model of Financial Attack TreesMargus Niitsoo. 354-370 [doi]