Abstract is missing.
- Confronting a mobile adversary in unattended sensor networksGene Tsudik. 1 [doi]
- Prototyping security test objects for use with advanced biometric authentication systemsTsutomu Matsumoto. 2 [doi]
- A strict evaluation method on the number of conditions for the SHA-1 collision searchJun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta. 10-20 [doi]
- HMAC is a randomness extractor and applications to TLSPierre-Alain Fouque, David Pointcheval, Sébastien Zimmer. 21-32 [doi]
- An overview of side channel analysis attacksThanh-Ha Le, Cécile Canovas, Jessy Clédière. 33-43 [doi]
- Avoiding timing channels in fixed-priority schedulersMarcus Völp, Claude-Joachim Hamann, Hermann Härtig. 44-55 [doi]
- A block cipher based pseudo random number generator secure against side-channel key recoveryChristophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung. 56-65 [doi]
- On the protocol composition logic PCLCas J. F. Cremers. 66-76 [doi]
- An integrated framework for security protocol analysisMarcin Olszewski, Lukasz Cyra. 77-86 [doi]
- Computationally sound mechanized proofs for basic and public-key KerberosBruno Blanchet, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay. 87-99 [doi]
- CMV: automatic verification of complete mediation for java virtual machinesA. Prasad Sistla, V. N. Venkatakrishnan, Michelle Zhou, Hilary Branske. 100-111 [doi]
- Secure slices of insecure programsSalvador Cavadini. 112-122 [doi]
- Verified implementations of the information card federated identity-management protocolKarthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy. 123-135 [doi]
- Principled reasoning and practical applications of alert fusion in intrusion detection systemsGuofei Gu, Alvaro A. Cárdenas, Wenke Lee. 136-147 [doi]
- Detecting VoIP based DoS attacks at the public safety answering pointChristoph Fuchs, Nils Aschenbruck, Felix Leder, Peter Martini. 148-155 [doi]
- A practical mimicry attack against powerful system-call monitorsChetan Parampalli, R. Sekar, Rob Johnson. 156-167 [doi]
- SNAPP: stateless network-authenticated path pinningBryan Parno, Adrian Perrig, Dave Andersen. 168-178 [doi]
- A general model of probabilistic packet marking for IP tracebackLiming Lu, Mun Choon Chan, Ee-Chien Chang. 179-188 [doi]
- Secure neighbor discovery in wireless networks: formal investigation of possibilityMarcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux. 189-200 [doi]
- SEAR: a secure efficient ad hoc on demand routing protocol for wireless networksQing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe. 201-204 [doi]
- On spatio-temporal constraints and inheritance in role-based access controlLiang Chen, Jason Crampton. 205-216 [doi]
- Online subscriptions with anonymous accessMarina Blanton. 217-227 [doi]
- Towards an efficient and language-agnostic compliance checker for trust negotiation systemsAdam J. Lee, Marianne Winslett. 228-239 [doi]
- Mechanisms for usage controlAlexander Pretschner, Manuel Hilty, David A. Basin, Christian Schaefer, Thomas Walter. 240-244 [doi]
- Usage control platformization via trustworthy SELinuxMasoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang. 245-248 [doi]
- Securing group key exchange against strong corruptionsEmmanuel Bresson, Mark Manulis. 249-260 [doi]
- Security arguments for the UM key agreement protocol in the NIST SP 800-56A standardAlfred Menezes, Berkant Ustaoglu. 261-270 [doi]
- Non-interactive conference key distribution and its applicationsReihaneh Safavi-Naini, Shaoquan Jiang. 271-282 [doi]
- Robust, anonymous RFID authentication with constant key-lookupMike Burmester, Breno de Medeiros, Rossana Motta. 283-291 [doi]
- Mutual authentication in RFID: security and privacyRadu-Ioan Paise, Serge Vaudenay. 292-299 [doi]
- Provably secure browser-based user-aware mutual authentication over TLSSebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk. 300-311 [doi]
- Private combinatorial group testingMikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho. 312-320 [doi]
- Controlled privacy preserving keyword searchStephen S. Yau, Yin Yin. 321-324 [doi]
- Exploiting social networks for threshold signing: attack-resilience vs. availabilityShouhuai Xu, Xiaohu Li, T. Paul Parker. 325-336 [doi]
- A short anonymously revocable group signature scheme from decision linear assumptionToru Nakanishi, Nobuo Funabiki. 337-340 [doi]
- Practical forward secure sequential aggregate signaturesDi Ma. 341-352 [doi]
- Efficient signature schemes supporting redaction, pseudonymization, and data deidentificationStuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao. 353-362 [doi]
- Efficient designated confirmer signature from bilinear pairingsFangguo Zhang, Xiaofeng Chen, Baodian Wei. 363-368 [doi]
- Certificateless signcryptionManuel Barbosa, Pooya Farshim. 369-372 [doi]
- Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06Jong Hwan Park, Ki Tak Kim, Dong-Hoon Lee. 373-380 [doi]
- Stateful identity-based encryption scheme: faster encryption and decryptionLe Trieu Phong, Hiroto Matsuoka, Wakaha Ogata. 381-388 [doi]