Abstract is missing.
- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership ProblemsJaimee Brown, Juan Manuel González Nieto, Colin Boyd. 1-18 [doi]
- Efficient Identity-Based Encryption with Tight Security ReductionNuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002. 19-36 [doi]
- A Diffie-Hellman Key Exchange Protocol Without Random OraclesIk Rae Jeong, Jeong Ok Kwon, Dong-Hoon Lee. 37-54 [doi]
- Authenticated Group Key Agreement for MulticastLiming Wang, Chuan-Kun Wu. 55-72 [doi]
- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc NetworksHongsong Shi, Mingxing He, Zhiguang Qin. 73-89 [doi]
- Efficient Mutual Data Authentication Using Manually Authenticated StringsSven Laur, Kaisa Nyberg. 90-107 [doi]
- Achieving Multicast Stream Authentication Using MDS CodesChristophe Tartary, Huaxiong Wang. 108-125 [doi]
- Shorter Verifier-Local Revocation Group Signatures from Bilinear MapsSujing Zhou, Dongdai Lin. 126-143 [doi]
- Security Model of Proxy-Multi Signature SchemesFeng Cao, Zhenfu Cao. 144-152 [doi]
- Efficient ID-Based One-Time Proxy Signature and Its Application in E-ChequeRongxing Lu, Zhenfu Cao, Xiaolei Dong. 153-167 [doi]
- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary FieldsTae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim. 168-181 [doi]
- Improved Collision Attack on Reduced Round CamelliaGuan Jie, Zhang Zhongya. 182-190 [doi]
- Stealing Secrets with SSL/TLS and SSH - Kleptographic AttacksZbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski. 191-202 [doi]
- Bitslice Implementation of AESChester Rebeiro, A. David Selvakumar, A. S. L. Devi. 203-212 [doi]
- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over ::::GF::::(3)Jianqin Zhou, Qiang Zheng. 213-223 [doi]
- Steganalysis Based on Differential StatisticsZugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan. 224-240 [doi]
- Watermarking Essential Data Structures for Copyright ProtectionQutaiba Albluwi, Ibrahim Kamel. 241-258 [doi]
- A Note of Perfect Nonlinear FunctionsXiyong Zhang, Hua Guo, Jinjiang Yuan. 259-269 [doi]
- Chaotic Keystream Generator Using Coupled NDFs with Parameter PerturbingXiaomin Wang, Jiashu Zhang, Wenfang Zhang. 270-285 [doi]
- Cooperative Intrusion Detection for Web ApplicationsNathalie Dagorn. 286-302 [doi]
- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and AnalysisJianhua Yang, Byong Lee, Yongzhong Zhang. 303-317 [doi]
- Smart Architecture for High-Speed Intrusion Detection and Prevention SystemsChih-Chiang Wu, Sung-Hua Wen, Nen-Fu Huang. 318-328 [doi]
- A Multi-agent Cooperative Model and System for Integrated Security MonitoringXianxian Li, Lijun Liu. 329-341 [doi]
- Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End NetworkJian Kang, Yuan Zhang, Jiu-bin Ju. 342-353 [doi]
- An Immune-Based Model for Service SurvivabilityJinquan Zeng, XiaoJie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu. 354-363 [doi]
- X:::2BT::: Trusted Reputation System: A Robust Mechanism for P2P NetworksLan Yu, Willy Susilo, Reihaneh Safavi-Naini. 364-380 [doi]