Abstract is missing.
- E cient Identity-based Signcryption without Random OraclesPeter Hyun-Jeen Lee, Udaya Parampalli, Shivaramakrishnan Narayan. 3-14 [doi]
- Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d IntegersVorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai. 15-26 [doi]
- State convergence in the initialisation of the Sfinks stream cipherAli Al-Hamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong. 27-32 [doi]
- Cryptanalysis of RC4-Based Hash FunctionMohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld. 33-38 [doi]
- Towards a Secure Human-and-Computer Mutual Authentication ProtocolKenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton. 39-46 [doi]
- Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri NetsYounes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd. 47-58 [doi]
- Tool-Supported Dataflow Analysis of a Security-Critical Embedded DeviceChris Mills, Colin J. Fidge, Diane Corney. 59-70 [doi]
- Data Flow Analysis of Embedded Program ExpressionsChristopher Doble, Colin J. Fidge, Diane Corney. 71-82 [doi]
- A taint marking approach to confidentiality violation detectionChristophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge. 83-90 [doi]
- Improving the Efficiency of RFID Authentication with Pre-ComputationKaleb Lee, Juan Manuel González Nieto, Colin Boyd. 91-100 [doi]