Abstract is missing.
- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error CaseVentzislav Nikov, Svetla Nikova, Bart Preneel. 1-15 [doi]
- Optimized Chi:::2:::-Attack against RC6Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji. 16-32 [doi]
- Anonymity-Enhanced Pseudonym SystemYuko Tamura, Atsuko Miyaji. 33-47 [doi]
- Using Feedback to Improve Masquerade DetectionKwong H. Yung. 48-62 [doi]
- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet ServicesZhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun. 63-75 [doi]
- An IP Traceback Scheme Integrating DPM and PPMFan Min, Jun-yan Zhang, Guo-wie Yang. 76-85 [doi]
- Improved Scalable Hash Chain TraversalSung-Ryul Kim. 86-95 [doi]
- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm ProblemRui Zhang 0002, Hideki Imai. 96-110 [doi]
- On the Security of Two Threshold Signature Schemes with Traceable SignersGuilin Wang, Xiaoxi Han, Bo Zhu. 111-122 [doi]
- Proxy and Threshold One-Time SignaturesMohamed Al-Ibrahim, Anton Cerný. 123-136 [doi]
- A Threshold GQ Signature SchemeLi-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng. 137-150 [doi]
- Generalized Key-Evolving Signature Schemes or How to Foil an Armed AdversaryGene Itkis, Peng Xie. 151-168 [doi]
- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature SchemeChong-zhi Gao, Zheng-an Yao, Lei Li. 169-175 [doi]
- Modelling and Evaluating Trust Relationships in Mobile Agents Based SystemsChing Lin, Vijay Varadharajan. 176-190 [doi]
- An Authorization Model for E-consent Requirement in a Health Care ApplicationChun Ruan, Vijay Varadharajan. 191-205 [doi]
- PLI: A New Framework to Protect Digital Content for P2P NetworksGuofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang. 206-216 [doi]
- Improved Algebraic Traitor Tracing SchemeChunyan Bai, Gui Liang Feng. 217-227 [doi]
- Common Vulnerability Markup LanguageHaitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang. 228-240 [doi]
- Trust on Web Browser: Attack vs. DefenseTieyan Li, Yongdong Wu. 241-253 [doi]
- Security Protocols for Biometrics-Based Cardholder Authentication in SmartcardsLuciano Rila, Chris J. Mitchell. 254-264 [doi]
- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third PartyJae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park. 265-279 [doi]
- Using OCSP to Secure Certificate-Using Transactions in M-commerceJose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano. 280-292 [doi]
- Differential Fault Analysis on A.E.SPierre Dusart, Gilles Letourneux, Olivier Vivolo. 293-306 [doi]
- Side-Channel Attack on Substitution BlocksRoman Novak. 307-318 [doi]
- Timing Attack against Implementation of a Parallel Algorithm for Modular ExponentiationYasuyuki Sakai, Kouichi Sakurai. 319-330 [doi]
- A Fast Correlation Attack for LFSR-Based Stream CiphersSarbani Palit, Bimal K. Roy, Arindom De. 331-342 [doi]
- Making the Key Agreement Protocol in Mobile ad hoc Network More EfficientGang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng. 343-356 [doi]
- An Efficient Tree-Based Group Key Agreement Using Bilinear MapSangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu. 357-371 [doi]
- A Key Recovery Mechanism for Reliable Group Key ManagementTaenam Cho, Sang Ho Lee. 372-386 [doi]
- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner ModelSandeepan Chowdhury, Subhamoy Maitra. 387-402 [doi]
- Efficient Distributed Signcryption Scheme as Group SigncryptionDong Jin Kwak, Sang-Jae Moon. 403-417 [doi]
- Architectural Enhancements for Montgomery Multiplication on Embedded RISC ProcessorsJohann Großschädl, Guy-Armand Kamendje. 418-434 [doi]