Abstract is missing.
- On Bluetooth Repairing: Key Agreement Based on Symmetric-Key CryptographySerge Vaudenay. 1-9 [doi]
- You Can Prove So Many Things in Zero-KnowledgeGiovanni Di Crescenzo. 10-27 [doi]
- Improvements on Security Proofs of Some Identity Based Encryption SchemesRui Zhang 0002, Hideki Imai. 28-41 [doi]
- An ID-Based Verifiable Encrypted Signature Scheme Based on Hess s Scheme Chunxiang Gu, Yuefei Zhu. 42-52 [doi]
- ID-Based Signature Scheme Without Trusted PKGJian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong. 53-62 [doi]
- Specifying Authentication Using Signal Events in CSPSiraj A. Shaikh, Vicky J. Bush, Steve A. Schneider. 63-74 [doi]
- Modeling RFID SecurityXiaolan Zhang 0003, Brian King. 75-90 [doi]
- Enforcing Email Addresses Privacy Using TokensRoman Schlegel, Serge Vaudenay. 91-100 [doi]
- Efficient Authentication of Electronic Document WorkflowYongdong Wu. 101-112 [doi]
- Practical Strong Designated Verifier Signature Schemes Based on Double Discrete LogarithmsRaylin Tso, Takeshi Okamoto, Eiji Okamoto. 113-127 [doi]
- Efficient Group Signatures from Bilinear PairingXiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang. 128-139 [doi]
- Enhanced Aggregate Signatures from PairingsZuhua Shao. 140-149 [doi]
- Constructing Secure Proxy CryptosystemYuan Zhou, Zhenfu Cao, Zhenchuan Chai. 150-161 [doi]
- Towards a General RC4-Like Keystream GeneratorGuang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz. 162-174 [doi]
- HCTR: A Variable-Input-Length Enciphering ModePeng Wang, Dengguo Feng, Wenling Wu. 175-188 [doi]
- The ::::k::::th-Order Quasi-Generalized Bent Functions over Ring Z::p::Jihong Teng, Shiqu Li, Xiaoying Huang. 189-201 [doi]
- A Fast Algorithm for Determining the Linear Complexity of Periodic SequencesShimin Wei, Guolong Chen, Guozhen Xiao. 202-209 [doi]
- An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NPHongda Li, Bao Li. 210-220 [doi]
- An Improved Secure Two-Party Computation ProtocolYu Yu, Jussipekka Leiwo, Benjamin Premkumar. 221-232 [doi]
- Security Analysis of Some Threshold Signature Schemes and Multi-signature SchemesTianjie Cao, Dongdai Lin. 233-241 [doi]
- ID-Based Threshold Unsigncryption Scheme from PairingsFagen Li, Juntao Gao, Yupu Hu. 242-253 [doi]
- Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical ApproachGil-Jong Mun, Yong-Min Kim, DongKook Kim, BongNam Noh. 254-264 [doi]
- The Conflict Detection Between Permission Assignment Constraints in Role-Based Access ControlChang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon. 265-278 [doi]
- Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature SelectionJong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim. 279-289 [doi]
- Security Analysis of Three Cryptographic Schemes from Other Cryptographic SchemesSherman S. M. Chow, Zhengjun Cao, Joseph K. Liu. 290-301 [doi]
- An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum EncryptionFei Gao, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu. 302-312 [doi]
- A Remark on Implementing the Weil PairingCheol-Min Park, Myung-Hwan Kim, Moti Yung. 313-323 [doi]
- Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECCPradeep Kumar Mishra. 324-335 [doi]
- Key Management for Secure Overlay MulticastJong-Hyuk Roh, Kyoon Ha Lee. 336-345 [doi]
- Design and Implementation of IEEE 802.11i Architecture for Next Generation WLANDuhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song. 346-357 [doi]
- Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint VaultYongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn. 358-369 [doi]
- Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing SchemesZhanfei Zhou. 370-383 [doi]
- New Methods to Construct Cheating Immune Multisecret Sharing SchemeWen Ping Ma, Fu Tai Zhang. 384-394 [doi]
- Detection of Unknown DoS Attacks by Kolmogorov-Complexity FluctuationTakayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura. 395-406 [doi]
- MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS AttacksHyun-Sun Kang, Chang-Seop Park. 407-418 [doi]