Abstract is missing.
- New Paradigms for Password SecurityXavier Boyen. 1-5 [doi]
- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin PolicySebastian Gajek, Mark Manulis, Jörg Schwenk. 6-20 [doi]
- Secure Biometric Authentication with Improved AccuracyManuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa. 21-36 [doi]
- A Critical Analysis and Improvement of AACS Drive-Host AuthenticationJiayuan Sui, Douglas R. Stinson. 37-52 [doi]
- Comparing the Pre- and Post-specified Peer Models for Key AgreementAlfred Menezes, Berkant Ustaoglu. 53-68 [doi]
- Efficient One-Round Key Exchange in the Standard ModelColin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson. 69-83 [doi]
- On the Improvement of the BDF Attack on LSBS-RSAHung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo. 84-97 [doi]
- Public-Key Cryptosystems with Primitive Power Roots of UnityTakato Hirano, Koichiro Wada, Keisuke Tanaka. 98-112 [doi]
- Relationship between Two Approaches for Defining the Standard Model PA-nessIsamu Teranishi, Wakaha Ogata. 113-127 [doi]
- Distributed Verification of Mixing - Local Forking Proofs ModelJacek Cichon, Marek Klonowski, Miroslaw Kutylowski. 128-140 [doi]
- Fully-Simulatable Oblivious Set TransferHuafei Zhu. 141-154 [doi]
- Efficient Disjointness Tests for Private DatasetsQingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang. 155-169 [doi]
- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile AdversaryArpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan. 170-186 [doi]
- Methods for Linear and Differential Cryptanalysis of Elastic Block CiphersDebra L. Cook, Moti Yung, Angelos D. Keromytis. 187-202 [doi]
- Multidimensional Linear Cryptanalysis of Reduced Round SerpentMiia Hermelin, Joo Yeon Cho, Kaisa Nyberg. 203-215 [doi]
- Cryptanalysis of Reduced-Round SMS4 Block CipherLei Zhang, Wentao Zhang, Wenling Wu. 216-229 [doi]
- On the Unprovable Security of 2-Key XCBCPeng Wang, Dengguo Feng, Wenling Wu, Liting Zhang. 230-238 [doi]
- Looking Back at a New Hash FunctionOlivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin. 239-253 [doi]
- Non-linear Reduced Round Attacks against SHA-2 Hash FamilySomitra Kumar Sanadhya, Palash Sarkar. 254-266 [doi]
- Collisions for Round-Reduced LAKEFlorian Mendel, Martin Schläffer. 267-281 [doi]
- Preimage Attacks on Step-Reduced MD5Yu Sasaki, Kazumaro Aoki. 282-296 [doi]
- Linear Distinguishing Attack on ShannonRisto Hakala, Kaisa Nyberg. 297-305 [doi]
- Recovering RC4 Permutation from 2048 Keystream Bytes if jIs StuckSubhamoy Maitra, Goutam Paul. 306-320 [doi]
- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong. 321-335 [doi]
- Signature Generation and Detection of Malware FamiliesV. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar. 336-349 [doi]
- Reducing Payload Scans for Attack Signature Matching Using Rule ClassificationSunghyun Kim, Heejo Lee. 350-360 [doi]
- Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine MonitorYan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao. 361-375 [doi]
- FormatShield: A Binary Rewriting Defense against Format String AttacksPankaj Kohli, Bezawada Bruhadeshwar. 376-390 [doi]
- Advanced Permission-Role Relationship in Role-Based Access ControlMin Li, Hua Wang, Ashley W. Plank, Jianming Yong. 391-403 [doi]
- Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical DatabasesB. John Oommen, Ebaa Fayyoumi. 404-418 [doi]
- Montgomery Residue Representation Fault-Tolerant Computation in GF(2k)Silvana Medos, Serdar Boztas. 419-432 [doi]
- A Tree-Based Approach for Computing Double-Base ChainsChristophe Doche, Laurent Habsieger. 433-446 [doi]
- Extractors for Jacobians of Binary Genus-2 Hyperelliptic CurvesReza Rezaeian Farashahi. 447-462 [doi]
- Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange RepresentationChristophe Nègre, Thomas Plantard. 463-477 [doi]