Abstract is missing.
- All Sail, No Anchor III: Risk Aggregation and Time s ArrowBob Blakley, G. R. Blakley. 1-16 [doi]
- Traversing Middleboxes with the Host Identity ProtocolHannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam. 17-28 [doi]
- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South AustraliaPhillip Pudney, Jill Slay. 29-39 [doi]
- An Efficient Solution to the ARP Cache Poisoning ProblemVipul Goyal, Rohit Tripathy. 40-51 [doi]
- On Stern s Attack Against Secret Truncated Linear Congruential GeneratorsScott Contini, Igor Shparlinski. 52-60 [doi]
- On the Success Probability of chi:::2:::-attack on RC6Atsuko Miyaji, Yuuki Takano. 61-74 [doi]
- Solving Systems of Differential Equations of AdditionSouradyuti Paul, Bart Preneel. 75-88 [doi]
- A Tree Based One-Key Broadcast Encryption Scheme with Low Computational OverheadTomoyuki Asano, Kazuya Kamio. 89-100 [doi]
- Dynamic Group Key Agreement in Tree-Based SettingRatna Dutta, Rana Barua. 101-112 [doi]
- Immediate Data Authentication for Multicast in Resource Constrained NetworkC. K. Wong, Agnes Chan. 113-121 [doi]
- Redundant Trinomials for Finite Fields of Characteristic 2Christophe Doche. 122-133 [doi]
- Efficient Tate Pairing Computation for Elliptic Curves over Binary FieldsSoonhak Kwon. 134-145 [doi]
- A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus TwoIzuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi. 146-157 [doi]
- Using Fair Forfeit to Prevent Truncation Attacks on Mobile AgentsMing Yao, Kun Peng, Ed Dawson. 158-169 [doi]
- An Improved Execution Integrity Solution for Mobile AgentsMichelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd. 170-183 [doi]
- RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy ManagementMelanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum. 184-194 [doi]
- Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in SmartcardsJiqiang Lv, Yongfei Han. 195-206 [doi]
- Improved Zero Value Attack on XTRRégis Bevan. 207-217 [doi]
- Efficient Representations on Koblitz Curves with Resistance to Side Channel AttacksKatsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume. 218-229 [doi]
- SIFA: A Tool for Evaluation of High-Grade Security DevicesTim McComb, Luke Wildman. 230-241 [doi]
- Cancelable Key-Based Fingerprint TemplatesRussell Ang, Reihaneh Safavi-Naini, Luke McAven. 242-252 [doi]
- Hybrid Signcryption Schemes with Insider SecurityAlexander W. Dent. 253-266 [doi]
- On the Possibility of Constructing Meaningful Hash Collisions for Public KeysArjen K. Lenstra, Benne de Weger. 267-279 [doi]
- Tunable Balancing of RSASteven D. Galbraith, Chris Heneghan, James F. McKee. 280-292 [doi]
- Key Management for Role Hierarchy in Distributed SystemsCelia Li, Cungang Yang, Richard Cheung. 293-302 [doi]
- A Formalization of Distributed Authorization with DelegationShujing Wang, Yan Zhang. 303-315 [doi]
- Two Improved Partially Blind Signature Schemes from Bilinear PairingsSherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow. 316-328 [doi]
- On the Security of Nominative SignaturesWilly Susilo, Yi Mu. 329-335 [doi]
- Who Goes There? Internet Banking: A Matter of Risk and RewardAdrian McCullagh, William J. Caelli. 336-357 [doi]
- Role Activation Management in Role Based Access ControlRichard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu. 358-369 [doi]
- VO-Sec: An Access Control Framework for Dynamic Virtual OrganizationHai Jin, Weizhong Qiang, Xuanhua Shi, Deqing Zou. 370-381 [doi]
- An Efficient Implementation of a Threshold RSA Signature SchemeBrian King. 382-393 [doi]
- GBD Threshold Cryptography with an Application to RSA Key RecoveryChris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague. 394-405 [doi]
- An (n-t)-out-of-n Threshold Ring Signature SchemeToshiyuki Isshiki, Keisuke Tanaka. 406-416 [doi]
- Deposit-Case Attack Against Secure RoamingGuomin Yang, Duncan S. Wong, Xiaotie Deng. 417-428 [doi]
- Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee ProtocolsKim-Kwang Raymond Choo, Yvonne Hitchcock. 429-442 [doi]
- Group Signature Schemes with Membership Revocation for Large GroupsToru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nobuo Funabiki. 443-454 [doi]
- An Efficient Group Signature Scheme from Bilinear MapsJun Furukawa, Hideki Imai. 455-467 [doi]
- Group Signature Where Group Manager, Members and Open Authority Are Identity-BasedVictor K. Wei, Tsz Hon Yuen, Fangguo Zhang. 468-480 [doi]
- Analysis of the HIP Base Exchange ProtocolTuomas Aura, Aarthi Nagarajan, Andrei Gurtov. 481-493 [doi]
- ID-based Authenticated Key Agreement for Low-Power Mobile DevicesKyu Young Choi, Jung Yeon Hwang, Dong-Hoon Lee, In Seog Seo. 494-505 [doi]
- On the Security of Two Key-Updating Signature SchemesXingyang Guo, Quan Zhang, Chaojing Tang. 506-517 [doi]
- Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTSBo-Yin Yang, Jiun-Ming Chen. 518-531 [doi]
- Potential Impacts of a Growing Gap Between Theory and Practice in Information SecurityYvo Desmedt. 532-536 [doi]
- Security Analysis and Fix of an Anonymous Credential SystemYanjiang Yang, Feng Bao, Robert H. Deng. 537-547 [doi]
- Counting Abuses Using Flexible Off-line CredentialsKemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum. 548-559 [doi]
- Cryptanalysis of Two Variants of PCBC Mode When Used for Message IntegrityChris J. Mitchell. 560-571 [doi]
- New Cryptographic Applications of Boolean Function Equivalence ClassesWilliam Millan. 572-583 [doi]