Abstract is missing.
- Adaptive Detection of Local ScannersAhren Studer, Chenxi Wang. 1-17 [doi]
- Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion DetectionJianhua Yang, Yongzhong Zhang. 18-32 [doi]
- DSO: Dependable Signing OverlayGuofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough. 33-49 [doi]
- Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?Ahto Buldas, Sven Laur. 50-65 [doi]
- A Handy Multi-coupon SystemSébastien Canard, Aline Gouget, Emeline Hufschmitt. 66-81 [doi]
- An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free FamiliesDongvu Tonien, Reihaneh Safavi-Naini. 82-97 [doi]
- Efficient Memory Bound Puzzles Using Pattern DatabasesSujata Doshi, Fabian Monrose, Aviel D. Rubin. 98-113 [doi]
- Effect of Malicious SynchronizationMun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam. 114-129 [doi]
- Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never ForgetsElias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos. 130-145 [doi]
- Password Based Server Aided Key Exchange Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd. 146-161 [doi]
- Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer NetworksQiang Tang, Kim-Kwang Raymond Choo. 162-177 [doi]
- Stateful Subset CoverMattias Johansson, Gunnar Kreitz, Fredrik Lindholm. 178-193 [doi]
- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland FunctionsKhoongming Khoo, Guang Gong, Hian-Kiat Lee. 194-209 [doi]
- Breaking a New Instance of TTM CryptosystemsXuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding. 210-225 [doi]
- Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different PasswordsRaphael C.-W. Phan, Bok-Min Goi. 226-238 [doi]
- An AES Smart Card Implementation Resistant to Power Analysis AttacksChristoph Herbst, Elisabeth Oswald, Stefan Mangard. 239-252 [doi]
- Physical Security Bounds Against TamperingKerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi. 253-267 [doi]
- Flexible Exponentiation with Resistance to Side Channel AttacksCamille Vuillaume, Katsuyuki Okeya. 268-283 [doi]
- An Improved Poly1305 MACDayin Wang, Dongdai Lin, Wenling Wu. 284-292 [doi]
- Certificateless Public-Key Signature: Security Model and Efficient ConstructionZhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng. 293-308 [doi]
- High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic PrimitiveChetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi. 309-324 [doi]
- Authentication for Paranoids: Multi-party Secret HandshakesStanislaw Jarecki, Jihye Kim, Gene Tsudik. 325-339 [doi]
- On the Security of the Authentication Module of Chinese WLAN Standard Implementation PlanXinghua Li, Sang-Jae Moon, Jianfeng Ma. 340-348 [doi]
- W3Bcrypt: Encryption as a StylesheetAngelos Stavrou, Michael E. Locasto, Angelos D. Keromytis. 349-364 [doi]
- Combinatorial Structures for Design of Wireless Sensor NetworksDibyendu Chakrabarti, Jennifer Seberry. 365-374 [doi]
- Public Key Cryptography Sans Certificates in Ad Hoc NetworksNitesh Saxena. 375-389 [doi]
- Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor NetworksJongHyup Lee, Taekyoung Kwon, JooSeok Song. 390-404 [doi]
- A General Methodology for Pipelining the Point Multiplication Operation in Curve Based CryptographyKishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal. 405-420 [doi]
- Results on Almost Resilient FunctionsPinhui Ke, Jie Zhang, Qiaoyan Wen. 421-432 [doi]
- Real Perfect Contrast Visual Secret Sharing Schemes with ReversingChing-Nung Yang, Chung-Chun Wang, Tse-Shih Chen. 433-447 [doi]
- On Optimizing the Security-Throughput Trade-Off in Wireless Networks with AdversariesMohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi. 448-458 [doi]
- Improving the Randomized Initial Point Countermeasure Against DPAKouichi Itoh, Tetsuya Izu, Masahiko Takenaka. 459-469 [doi]
- Syntax-Driven Private Evaluation of Quantified Membership QueriesAggelos Kiayias, Antonina Mitrofanova. 470-485 [doi]