Abstract is missing.
- The Second-Preimage Attack on MD4Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang. 1-12 [doi]
- On the Security of Certificateless Signature Schemes from Asiacrypt 2003Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. 13-25 [doi]
- On the Security of a Group Signcryption Scheme from Distributed Signcryption SchemeHaiyong Bao, Zhenfu Cao, Haifeng Qian. 26-34 [doi]
- Cryptanalysis of Two Group Key Management Protocols for Secure MulticastWen Tao Zhu. 35-48 [doi]
- Security Analysis of Password-Authenticated Key Agreement ProtocolsKyung-Ah Shim, Seung-Hyun Seo. 49-58 [doi]
- An Immune-Based Model for Computer Virus DetectionTao Li, XiaoJie Liu, Hongbin Li. 59-71 [doi]
- A New Model for Dynamic Intrusion DetectionTao Li, XiaoJie Liu, Hongbin Li. 72-84 [doi]
- Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process InfectionRuo Ando, Yoshiyasu Takefuji. 85-95 [doi]
- A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-TimeWei Lu, Issa Traoré. 96-109 [doi]
- ID-Based Aggregate Signatures from Bilinear PairingsJing Xu, Zhenfeng Zhang, Dengguo Feng. 110-119 [doi]
- Efficient Identity-Based Signatures and Blind SignaturesZhenjie Huang, Kefei Chen, YuMin Wang. 120-133 [doi]
- How to Authenticate Real Time Streams Using Improved Online/Offline SignaturesChong-zhi Gao, Zheng-an Yao. 134-146 [doi]
- New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key ExchangeEun-Jun Yoon, Kee-Young Yoo. 147-160 [doi]
- Two Proxy Signcryption Schemes from Bilinear PairingsQin Wang, Zhenfu Cao. 161-171 [doi]
- Constructing Secure Warrant-Based Proxy Signcryption SchemesYuan Zhou, Zhenfu Cao, Rongxing Lu. 172-185 [doi]
- Design and Implementation of an Inline Certified E-mail ServiceStelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco. 186-199 [doi]
- Efficient Identity-Based Protocol for Fair Certified E-mail DeliveryZhenfeng Zhang, Jing Xu, Dengguo Feng. 200-210 [doi]
- Similar Keys of Multivariate Quadratic Public Key CryptosystemsYuh-Hua Hu, Lih-Chung Wang, Chun-yen Chou, Feipei Lai. 211-222 [doi]
- A Note on Signed Binary Window Algorithm for Elliptic Curve CryptosystemsFanyu Kong, Daxing Li. 223-235 [doi]
- Constructions of Almost Resilient FunctionsPin-Hui Ke, Tai-Lin Liu, Qiao-Yan Wen. 236-246 [doi]
- A Novel Method to Maintain Privacy in Mobile Agent ApplicationsKun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez. 247-260 [doi]
- Non-expanding Transaction Specific Pseudonymization for IP Traffic MonitoringLasse Øverlier, Tønnes Brekne, André Årnes. 261-273 [doi]
- Revaluation of Error Correcting Coding in Watermarking ChannelLimin Gu, Yanmei Fang, Jiwu Huang. 274-287 [doi]
- On the Performance and Analysis of DNS Security ExtensionsReza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese. 288-303 [doi]
- On Securing RTP-Based Streaming Content with FirewallsLiang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo. 304-319 [doi]
- Safeguard Information Infrastructure Against DDoS Attacks: Experiments and ModelingYang Xiang, Wanlei Zhou. 320-333 [doi]
- Distributed Credential Chain Discovery in Trust-Management with Parameterized RolesXian Zhu, Shaobin Wang, Fan Hong, Junguo Liao. 334-348 [doi]