Abstract is missing.
- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC 05Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun. 1-12 [doi]
- Identity-Based Key-Insulated Signature with Secure Key-UpdatesJian Weng, Shengli Liu, Kefei Chen, Xiangxue Li. 13-26 [doi]
- Efficient Intrusion-Resilient Signatures Without Random OraclesBenoƮt Libert, Jean-Jacques Quisquater, Moti Yung. 27-41 [doi]
- New Constructions of Large Binary Sequences Family with Low CorrelationXin Tong, Jie Zhang, Qiao-Yan Wen. 42-53 [doi]
- On the Rate of Coincidence of Two Clock-Controlled CombinersXuexian Hu, Yongtao Ming, Wenfen Liu, Shiqu Li. 54-65 [doi]
- Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-PipeliningYuan-man Tong, Zhiying Wang, Kui Dai, Hongyi Lu. 66-77 [doi]
- OPMAC: One-Key Poly1305 MACDayin Wang, Dongdai Lin, Wenling Wu. 78-87 [doi]
- A General Construction of Tweakable Block Ciphers and Different Modes of OperationsDebrup Chakraborty, Palash Sarkar. 88-102 [doi]
- Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing SchemeChristophe Tartary, Huaxiong Wang. 103-117 [doi]
- Efficient Short Signcryption Scheme with Public VerifiabilityChangshe Ma. 118-129 [doi]
- A Revocation Scheme Preserving PrivacyLukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski. 130-143 [doi]
- Deterministic Packet Marking with Link Signatures for IP TracebackShi Yi, Yang Xinyu, Li Ning, Qi Yong. 144-152 [doi]
- Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection SystemYou Chen, Yang Li, Xueqi Cheng, Li Guo. 153-167 [doi]
- A Network Security Policy Model and Its Realization MechanismChenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao. 168-181 [doi]
- Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious TrafficGaeil An, Joon S. Park. 182-195 [doi]
- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of DutyChunYang Yuan, Yeping He, Jianbo He, Zhouyi Zhou. 196-210 [doi]
- Design and Implementation of Fast Access Control That Supports the Separation of DutySeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han. 211-224 [doi]
- A Practical Alternative to Domain and Type Enforcement Integrity Formal ModelsLiuying Tang, Sihan Qing. 225-237 [doi]
- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow AttacksDeok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hong. 238-252 [doi]
- Application and Evaluation of Bayesian Filter for Chinese SpamZhan Wang, Yoshiaki Hori, Kouichi Sakurai. 253-263 [doi]
- Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL HandshakesYongdong Wu, Feng Bao. 264-278 [doi]
- An Enterprise Security Management System as a Web-Based Application Service for Small/Medium BusinessesYoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon, Jin Gi Choe, Yu Kang. 279-288 [doi]
- Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw CodesMarcel Fernandez, Josep Cotrina Navau. 289-303 [doi]