Abstract is missing.
- Grouping Verifiable Content for Selective DisclosureLaurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng. 1-12 [doi]
- Evaluation of Anonymity of Practical Anonymous Communication NetworksShigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji. 13-26 [doi]
- An Anonymous Credential System and a Privacy-Aware PKIPino Persiano, Ivan Visconti. 27-38 [doi]
- Flaws in Some Robust Optimistic Mix-NetsMasayuki Abe, Hideki Imai. 39-50 [doi]
- The Unsolvable Privacy Problem and Its Implications for Security TechnologiesAndrew M. Odlyzko. 51-54 [doi]
- The Security of Fixed versus Random Elliptic Curves in CryptographyYvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson. 55-66 [doi]
- Cryptanalysis of the Full Version Randomized Addition-Subtraction ChainsDong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang-Han Kim, Heuisu Ryu. 67-78 [doi]
- Generic GF(2) Arithmetic in Software and Its Application to ECCAndré Weimerskirch, Douglas Stebila, Sheueling Chang Shantz. 79-92 [doi]
- An Addition Algorithm in Jacobian of C::34:: CurveSeigo Arita. 93-105 [doi]
- Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power TracesSung-Ming Yen. 106-117 [doi]
- Differential Fault Analysis on AES Key Schedule and Some CoutnermeasuresChien-Ning Chen, Sung-Ming Yen. 118-129 [doi]
- On the Pseudorandomness of KASUMI Type PermutationsTetsu Iwata, Tohru Yagi, Kaoru Kurosawa. 130-141 [doi]
- Theoretical Analysis of chi:::2::: Attack on RC6Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba. 142-153 [doi]
- A Typed Theory for Access Control and Information Flow Control in Mobile SystemsLibin Wang, Kefei Chen. 154-165 [doi]
- Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk ApproachYiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto. 166-179 [doi]
- Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile CommunicationsJabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sung Won Sohn. 180-191 [doi]
- Practical Pay TV SchemesArvind Narayanan, C. Pandu Rangan, Kwangjo Kim. 192-203 [doi]
- Cooperative Routers against DoS AttacksHa Yoon Song, Han-gyoo Kim. 204-213 [doi]
- Detecting Distributed Denial of Service Attacks by Sharing Distributed BeliefsTao Peng, Christopher Leckie, Kotagiri Ramamohanarao. 214-225 [doi]
- Malicious ICMP Tunneling: Defense against the VulnerabilityAbhishek Singh, Ola Nordström, Chenghuai Lu, André L. M. dos Santos. 226-235 [doi]
- On Fair E-cash Systems Based on Group Signature SchemesSébastien Canard, Jacques Traoré. 237-248 [doi]
- A Taxonomy of Single Sign-On SystemsAndreas Pashalidis, Chris J. Mitchell. 249-264 [doi]
- Key Recovery Attacks on the RMAC, TMAC, and IACBCJaechul Sung, Deukjo Hong, Sangjin Lee. 265-273 [doi]
- Key Recovery Attacks on NTRU without Ciphertext Validation RoutineDaewan Han, Jin Hong, Jae Woo Han, Daesung Kwon. 274-284 [doi]
- Permanent Fault Attack on the Parameters of RSA with CRTSung-Ming Yen, Sang-Jae Moon, JaeCheol Ha. 285-296 [doi]
- Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy PlaintextsAdam Young, Moti Yung. 297-311 [doi]
- Efficient ID-Based Blind Signature and Proxy Signature from Bilinear PairingsFangguo Zhang, Kwangjo Kim. 312-323 [doi]
- Digital Signature Schemes with Restriction on Signing CapabilityJung Yeon Hwang, Hyun-Jeong Kim, Dong-Hoon Lee, Jong In Lim. 324-335 [doi]
- On the Extract Security of Multi-signature Schemes Based on RSAKei Kawauchi, Mitsuru Tada. 336-349 [doi]
- A Length-Flexible Threshold Cryptosystem with ApplicationsIvan Damgård, Mads Jurik. 350-364 [doi]
- Separating Encryption and Key Issuance in Digital Rights Management SystemsGoichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai. 365-376 [doi]
- An Efficient Revocation Scheme with Minimal Message Length for Stateless ReceiversYong Ho Hwang, Chong Hee Kim, Pil Joong Lee. 377-386 [doi]
- Josef Pieprzyk, David PointchevalJosef Pieprzyk, David Pointcheval. 387-401 [doi]
- Is Cross-Platform Security Possible?Li Gong. 402
- A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information SystemsJason Reid, Ian Cheong, Matthew Henricksen, Jason Smith. 403-415 [doi]
- Cryptanalysis of a New Cellular Automata CryptosystemFeng Bao. 416-427 [doi]
- A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift RegistersChik-How Tan, Xun Yi, Chee Kheong Siew. 428-442 [doi]
- Clock-Controlled Shrinking Generator of Feedback Shift RegistersAli Kanso. 443-451 [doi]
- EPA: An Efficient Password-Based Protocal for Authenticated Key ExchangeYong Ho Hwang, Dae Hyun Yum, Pil Joong Lee. 452-463 [doi]
- Constructing General Dynamic Group Key Distribution Schemes with Decentralized User JoinVanesa Daza, Javier Herranz, Germán Sáez. 464-475 [doi]
- Robust Software Tokens - Yet Another Method for Securing User s Digital IdentityTaekyoung Kwon. 476-487 [doi]
- Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal OrdersHwankoo Kim, Sang-Jae Moon. 488-497 [doi]
- New Constructions for Resilient and Highly Nonlinear Boolean FunctionsKhoongming Khoo, Guang Gong. 498-509 [doi]
- On Parallel Hash Functions Based on Block-CipherToshihiko Matsuo, Kaoru Kurosawa. 510-521 [doi]
- Square Hash with a Small Key SizeSwee-Huay Heng, Kaoru Kurosawa. 522-531 [doi]