Abstract is missing.
- Universal ::::eta::::::T:: Pairing Algorithm over Arbitrary Extension DegreeMasaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto. 1-15 [doi]
- Convertible Undeniable Proxy Signatures: Security Models and Efficient ConstructionWei Wu, Yi Mu, Willy Susilo, Xinyi Huang. 16-29 [doi]
- Secret Signatures: How to Achieve Business Privacy Efficiently?Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo. 30-47 [doi]
- Implementation of BioAPI Conformance Test Suite Using BSP Testing ModelJihyeon Jang, Stephen J. Elliott, Hakil Kim. 48-60 [doi]
- Information Hiding in Software with Mixed Boolean-Arithmetic TransformsYongxin Zhou 0002, Alec Main, Yuan Xiang Gu, Harold Johnson. 61-75 [doi]
- Geometrically Invariant Image Watermarking in the DWT DomainShijun Xiang, Hyoung Joong Kim. 76-90 [doi]
- Implementation of LSM-Based RBAC Module for Embedded SystemJae-Deok Lim, Sung-Kyong Un, Jeong-Nyeo Kim, ChoelHoon Lee. 91-101 [doi]
- Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware ImplementationsYong Ki Lee, Herwin Chan, Ingrid Verbauwhede. 102-114 [doi]
- A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication ProcessorYong Ki Lee, Ingrid Verbauwhede. 115-127 [doi]
- Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual MachineYoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, Norihisa Komoda. 128-141 [doi]
- An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider AttacksFrederic Stumpf, Patrick Röder, Claudia Eckert. 142-156 [doi]
- Detecting Motifs in System Call SequencesWilliam O. Wilson, Jan Feyereisl, Uwe Aickelin. 157-172 [doi]
- Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement SystemToru Hashimoto, Takashi Itoh, Masazumi Ueba, Hisato Iwai, Hideichi Sasaoka, Kazukuni Kobara, Hideki Imai. 173-187 [doi]
- Breaking 104 Bit WEP in Less Than 60 SecondsErik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin. 188-202 [doi]
- Efficient Implementation of the Pairing on Mobilephones Using BREWMotoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka. 203-214 [doi]
- Security Analysis of MISTY1Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko. 215-226 [doi]
- A Generic Method for Secure SBox ImplementationEmmanuel Prouff, Matthieu Rivain. 227-244 [doi]
- On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology ConferencesSwee-Won Lo, Raphael C.-W. Phan, Bok-Min Goi. 245-265 [doi]
- Authorization Constraints Specification of RBACLilong Han, Qingtang Liu, Zongkai Yang. 266-276 [doi]
- Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on RiskZhuo Tang, Ruixuan Li, Zhengding Lu, Zhumu Wen. 277-290 [doi]
- A Compositional Multiple Policies Operating System Security ModelLei Xia, Wei Huang, Hao Huang. 291-302 [doi]
- Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter OnesColin D. Walter. 303-316 [doi]
- Differential Power Analysis of HMAC Based on SHA-2, and CountermeasuresRobert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane. 317-332 [doi]
- Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECCJaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen. 333-344 [doi]
- Risk & Distortion Based K-AnonymityShenkun Xu, Xiaojun Ye. 345-358 [doi]
- Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security SystemMyeonggil Choi, Sangmun Shin. 359-370 [doi]
- ICRep: An Incentive Compatible Reputation Mechanism for P2P SystemsJunsheng Chang, Huaimin Wang, Gang Yin, Yang-Bin Tang. 371-386 [doi]