Abstract is missing.
- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the CheapMichael E. Locasto, Angelos D. Keromytis. 1-15 [doi]
- Private Keyword-Based Push and Pull with Applications to Anonymous CommunicationLea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang. 16-30 [doi]
- Secure Conjunctive Keyword Search over Encrypted DataPhilippe Golle, Jessica Staddon, Brent R. Waters. 31-45 [doi]
- Evaluating Security of Voting Schemes in the Universal Composability FrameworkJens Groth. 46-60 [doi]
- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable SecurityLan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa. 61-75 [doi]
- On the Security of Cryptosystems with All-or-Nothing TransformRui Zhang 0002, Goichiro Hanaoka, Hideki Imai. 76-90 [doi]
- Centralized Management of Virtual Security Zones in IP NetworksAntti Peltonen, Teemupekka Virtanen, Esa Turtiainen. 91-102 [doi]
- S-RIP: A Secure Distance Vector Routing ProtocolTao Wan, Evangelos Kranakis, Paul C. van Oorschot. 103-119 [doi]
- A Pay-per-Use DoS Protection Mechanism for the WebAngelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. 120-134 [doi]
- Limited Verifier Signature from Bilinear PairingsXiaofeng Chen, Fangguo Zhang, Kwangjo Kim. 135-148 [doi]
- Deniable Ring Authentication RevisitedWilly Susilo, Yi Mu. 149-163 [doi]
- A Fully-Functional Group Signature Scheme over Only Known-Order GroupAtsuko Miyaji, Kozue Umeda. 164-179 [doi]
- Some Observations on Zap and Its ApplicationsYunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu. 180-193 [doi]
- Security Measurements of Steganographic SystemsWeiming Zhang, Shiqu Li. 194-204 [doi]
- X:::2:::Rep: Enhanced Trust Semantics for the XRep ProtocolNathan Curtis, Reihaneh Safavi-Naini, Willy Susilo. 205-219 [doi]
- One-Round Protocols for Two-Party Authenticated Key ExchangeIk Rae Jeong, Jonathan Katz, Dong-Hoon Lee. 220-232 [doi]
- Password Authenticated Key Exchange Using Quadratic ResiduesMuxiang Zhang. 233-247 [doi]
- Key Agreement Using Statically Keyed AuthenticatorsColin Boyd, Wenbo Mao, Kenneth G. Paterson. 248-262 [doi]
- Low-Latency Cryptographic Protection for SCADA CommunicationsAndrew K. Wright, John A. Kinast, Joe McCarty. 263-277 [doi]
- A Best Practice for Root CA Key Update in PKIInKyoung Jeun, Jongwook Park, TaeKyu Choi, SangWan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin. 278-291 [doi]
- SQLrand: Preventing SQL Injection AttacksStephen W. Boyd, Angelos D. Keromytis. 292-302 [doi]
- Cryptanalysis of a Knapsack Based Two-Lock CryptosystemBin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao. 303-309 [doi]
- Success Probability in Chi:::2:::-AttacksTakashi Matsunaka, Atsuko Miyaji, Yuuki Takano. 310-325 [doi]
- More Generalized Clock-Controlled Alternating Step GeneratorAli Kanso. 326-338 [doi]
- FDLKH: Fully Decentralized Key Management Scheme on Logical Key HierarchyDaisuke Inoue, Masahiro Kuroda. 339-354 [doi]
- Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based ModelAnderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai. 355-368 [doi]
- Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True AnonymityBok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi. 369-382 [doi]
- Security Analysis of CRT-Based CryptosystemsKatsuyuki Okeya, Tsuyoshi Takagi. 383-397 [doi]
- Cryptanalysis of the Countermeasures Using Randomized Binary Signed DigitsDong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung. 398-413 [doi]
- Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different PasswordsShuhong Wang, Jie Wang, MaoZhi Xu. 414-425 [doi]
- Advanced Packet Marking Mechanism with Pushback for IP TracebackHyung-Woo Lee. 426-438 [doi]
- A Parallel Intrusion Detection System for High-Speed NetworksHaiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li. 439-451 [doi]
- A Novel Framework for Alert Correlation and UnderstandingDong Yu, Deborah A. Frincke. 452-466 [doi]
- An Improved Algorithm for uP + vQ Using JSF:::1:::::3::BaiJie Kuang, Yuefei Zhu, YaJuan Zhang. 467-478 [doi]
- New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p:::n:::)Palash Sarkar, Pradeep Kumar Mishra, Rana Barua. 479-493 [doi]
- Batch Verification for Equality of Discrete Logarithms and Threshold DecryptionsRiza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee. 494-508 [doi]