Abstract is missing.
- Stateful Public-Key Encryption: A Security Solution for Resource-Constrained EnvironmentJoonsang Baek, Willy Susilo, Khaled Salah, Jun Su Ha, Ernesto Damiani, Ilsun You. 1-22 [doi]
- Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart GridZijian Zhang, Jialing He, Liehuang Zhu, Kui Ren 0001. 23-48 [doi]
- Accountable Anonymous CredentialsZuoxia Yu, Man Ho Au, Rupeng Yang. 49-68 [doi]
- CAPTCHA Design and Security IssuesYang-Wai Chow, Willy Susilo, Pairat Thorncharoensri. 69-92 [doi]
- Ring SignatureJoseph K. Liu. 93-114 [doi]
- Data Authentication with Privacy ProtectionJianghua Liu, Yang Xiang 0001, Wanlei Zhou, Xinyi Huang, Jinhua Ma. 115-142 [doi]
- A Methodology for Retrofitting Privacy and Its Application to e-Shopping TransactionsJesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. RodrÃguez, Moti Yung. 143-183 [doi]
- Pseudonymous Signature SchemesPrzemyslaw Blaskiewicz, Lucjan Hanzlik, Kamil Kluczniak, Lukasz Krzywiecki, Miroslaw Kutylowski, Marcin Slowik, Marta Wszola. 185-255 [doi]