Abstract is missing.
- Two-Server Password-Only Authenticated Key ExchangeJonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor. 1-16 [doi]
- Strengthening Password-Based Authentication Protocols Against Online Dictionary AttacksPeng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon. 17-32 [doi]
- Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) SchemeRaphael Chung-Wei Phan, Bok-Min Goi. 33-39 [doi]
- Efficient Security Mechanisms for Overlay Multicast-Based Content DistributionSencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia. 40-55 [doi]
- A Traitor Tracing Scheme Based on RSA for Fast DecryptionJohn Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee. 56-74 [doi]
- N-Party Encrypted Diffie-Hellman Key Exchange Using Different PasswordsJin Wook Byun, Dong-Hoon Lee. 75-90 [doi]
- Messin with Texas Deriving Mother s Maiden Names Using Public RecordsVirgil Griffith, Markus Jakobsson. 91-103 [doi]
- Mitigating Network Denial-of-Service Through Diversity-Based Traffic ManagementAshraf Matrawy, Paul C. van Oorschot, Anil Somayaji. 104-121 [doi]
- Searching for High-Value Rare Events with Uncheatable Grid ComputingWenliang Du, Michael T. Goodrich. 122-137 [doi]
- Digital Signatures Do Not Guarantee Exclusive OwnershipThomas Pornin, Julien P. Stern. 138-150 [doi]
- Thompson s Group and Public Key CryptographyVladimir Shpilrain, Alexander Ushakov. 151-163 [doi]
- Rainbow, a New Multivariable Polynomial Signature SchemeJintai Ding, Dieter Schmidt. 164-175 [doi]
- Badger - A Fast and Provably Secure MACMartin Boesgaard, Thomas Christensen, Erik Zenner. 176-191 [doi]
- IDS False Alarm Reduction Using Continuous and Discontinuous PatternsAbdulrahman Alharby, Hideki Imai. 192-205 [doi]
- Indexing Information for Data ForensicsMichael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia. 206-221 [doi]
- Model Generalization and Its Implications on Intrusion DetectionZhuowei Li, Amitabha Das, Jianying Zhou. 222-237 [doi]
- Intrusion-Resilient Secure ChannelsGene Itkis, Robert McNerney, Scott Russell. 238-253 [doi]
- Optimal Asymmetric Encryption and Signature PaddingsBenoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval. 254-268 [doi]
- Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSASeongHan Shin, Kazukuni Kobara, Hideki Imai. 269-284 [doi]
- Identity Based Encryption Without RedundancyBenoît Libert, Jean-Jacques Quisquater. 285-300 [doi]
- OACerts: Oblivious Attribute CertificatesJiangtao Li, Ninghui Li. 301-317 [doi]
- Dynamic k-Times Anonymous AuthenticationLan Nguyen, Reihaneh Safavi-Naini. 318-333 [doi]
- Efficient Anonymous Roaming and Its Security AnalysisGuomin Yang, Duncan S. Wong, Xiaotie Deng. 334-349 [doi]
- Quantifying Security in Hybrid Cellular NetworksMarkus Jakobsson, Liu Yang. 350-363 [doi]
- Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid ApplicationsFlavio D. Garcia, Jaap-Henk Hoepman. 364-377 [doi]
- Building Reliable Mix Networks with Fair ExchangeMichael K. Reiter, Xiaofeng Wang, Matthew Wright. 378-392 [doi]
- SCARE of the DESRémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette. 393-406 [doi]
- Robust Key Extraction from Physical Uncloneable FunctionsBoris Skoric, Pim Tuyls, W. Ophey. 407-422 [doi]
- Efficient Constructions for One-Way Hash ChainsYih-Chun Hu, Markus Jakobsson, Adrian Perrig. 423-441 [doi]
- Privacy Preserving Keyword Searches on Remote Encrypted DataYan-Cheng Chang, Michael Mitzenmacher. 442-455 [doi]
- An Efficient Solution to the Millionaires Problem Based on Homomorphic EncryptionHsiao-Ying Lin, Wen-Guey Tzeng. 456-466 [doi]
- Non-interactive Zero-Knowledge Arguments for VotingJens Groth. 467-482 [doi]
- Short Signature and Universal Designated Verifier Signature Without Random OraclesRui Zhang 0002, Jun Furukawa, Hideki Imai. 483-498 [doi]
- Efficient Identity Based Ring SignatureSherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui. 499-512 [doi]
- New Signature Schemes with Coupons and Tight ReductionBenoît Chevallier-Mames. 513-528 [doi]