Abstract is missing.
- Controllable Ring SignaturesWei Gao, Guilin Wang, Xueli Wang, Dongqing Xie. 1-14 [doi]
- Efficient User Authentication and Key Agreement in Wireless Sensor NetworksWen-Shenq Juang. 15-29 [doi]
- Identity-Based Key Issuing Without Secure Channel in a Broad AreaSaeran Kwon, Sang Ho Lee. 30-44 [doi]
- PolyI-D: Polymorphic Worm Detection Based on Instruction DistributionKi Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim. 45-59 [doi]
- SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor NetworksJianqing Ma, Shiyong Zhang, YiPing Zhong, Xiaowen Tong. 60-73 [doi]
- SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise AlignmentJae-Chul Park, Bong-Nam Noh. 74-82 [doi]
- sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification AlgorithmSeung-Hyun Paek, Yoon-Keun Oh, Do-Hoon Lee. 83-99 [doi]
- Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with PasswordsDaesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee, Kiyoung Moon. 100-109 [doi]
- Impact of Embedding Scenarios on the Smart Card-Based Fingerprint VerificationByungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park. 110-120 [doi]
- Quality Assurance for Evidence Collection in Network ForensicsBo-Chao Cheng, Huan Chen. 121-132 [doi]
- Visualization of Permission Checks in Java Using Static AnalysisYoonkyung Kim, Byeong-Mo Chang. 133-146 [doi]
- Deployment of Virtual Machines in Lock-KeeperFeng Cheng 0002, Christoph Meinel. 147-159 [doi]
- Investigations of Power Analysis Attacks and Countermeasures for ARIAHyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, Sang-Jae Moon. 160-172 [doi]
- Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection ProtocolsMun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim. 173-186 [doi]
- A Novel Key Agreement Scheme in a Multiple Server EnvironmentChin-Chen Chang, Chia-Chi Wu. 187-197 [doi]
- Cost-Effective IDS Operating Scheme in MANETsYoungok Jeong, Younggoo Han, Hyunwoo Kim, Woochul Shim, Jaehong Kim, Sehun Kim. 198-210 [doi]
- Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6Hyun-Sun Kang, Chang-Seop Park. 211-224 [doi]
- A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile PhonesMichiru Tanaka, Yoshimi Teshigawara. 225-236 [doi]
- Distributed Management of OMA DRM DomainsHarikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen. 237-251 [doi]
- New Traceability Codes Against a Generalized Collusion Attack for Digital FingerprintingHideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa. 252-266 [doi]
- A Key Management Based on Multiple Regression in Hierarchical Sensor NetworkMihui Kim, Inshil Doh, Kijoon Chae. 267-281 [doi]
- Random Visitor: A Defense Against Identity Attacks in P2P Overlay NetworksJabeom Gu, Jaehoon Nah, Cheoljoo Chae, Jaekwang Lee, Jongsoo Jang. 282-296 [doi]
- Privacy Protection in PKIs: A Separation-of-Authority ApproachTaekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee. 297-311 [doi]
- Three-Party Password Authenticated Key Agreement Resistant to Server CompromiseTaekyoung Kwon, Dong Hoon Lee 0002. 312-323 [doi]
- Privacy-Enhanced Content Distribution and Charging Scheme Using Group SignatureTakayuki Tobita, Hironori Yamamoto, Hiroshi Doi, Keigo Majima. 324-338 [doi]
- Secret Handshake with Multiple GroupsNaoyuki Yamashita, Keisuke Tanaka. 339-348 [doi]
- Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APsChanil Park, Junbeom Hur, Chanoe Kim, Young-joo Shin, Hyunsoo Yoon. 349-363 [doi]
- EAP Using the Split Password-Based Authenticated Key AgreementJongho Ryu. 364-380 [doi]
- How Many Malicious Scanners Are in the Internet?Hiroaki Kikuchi, Masato Terada. 381-390 [doi]
- E-Passport: The Global Traceability Or How to Feel Like a UPS PackageDario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi. 391-404 [doi]