Abstract is missing.
- An Anonymous Authentication Protocol with Single-database PIRToru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura. 3-8 [doi]
- Cube Attack in Finite Fields of Higher OrderAndrea Agnesse, Marco Pedicini. 9-14 [doi]
- Secure Two-Party Association Rule MiningMd. Golam Kaosar, Russell Paulet, Xun Yi. 15-22 [doi]
- Detection of Anomalies from User Profiles Generated from System LogsMalcolm Corney, George M. Mohay, Andrew J. Clark. 23-32 [doi]
- Identification of Potential Malicious Web PagesVan Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk. 33-40 [doi]
- IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing CharacteristicsGünther Lackner, Peter Teufl. 41-50 [doi]
- A Modal Logic for Information System SecurityYun Bai, Khaled Khan. 51-56 [doi]
- Detection of Fast Flux Service NetworksScott Campbell, Steve Chan, Jason Lee. 57-66 [doi]
- Development and Evaluation of a Secure, Privacy Preserving Combinatorial AuctionBen Palmer, Kris Bubendorfer, Ian Welch. 67-76 [doi]
- Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and PerformanceThorsten Ries, Radu State, Andriy Panchenko. 77-86 [doi]