Abstract is missing.
- The privacy of tracing traitorsMoni Naor. 1-2 [doi]
- Robust fingerprinting codes: a near optimal constructionDan Boneh, Aggelos Kiayias, Hart William Montgomery. 3-12 [doi]
- An efficient public-key attribute-based broadcast encryption scheme allowing arbitrary access policiesPascal Junod, Alexandre Karlov. 13-24 [doi]
- A chameleon encryption scheme resistant to known-plaintext attackEe-Chien Chang, Chengfang Fang, Jia Xu. 25-34 [doi]
- A general model for hiding control flowJan Cappaert, Bart Preneel. 35-42 [doi]
- Secure cross-domain data sharing architecture for crisis managementVaibhav Gowadia, Enrico Scalavino, Emil C. Lupu, Dmitry Starostin, Alexey Orlov. 43-46 [doi]
- New construction of identity-based proxy re-encryptionSong Luo, Jian-bin Hu, Zhong Chen. 47-50 [doi]
- An introduction to interoperable digital rights lockerEric Diehl, Arnaud Robert. 51-54 [doi]
- Using digital rights management for securing data in a medical research environmentMohammad Jafari, Reihaneh Safavi-Naini, Chad Saunders, Nicholas Paul Sheppard. 55-60 [doi]
- An analysis of interoperability between licensesKunihiko Fujita, Yasuyuki Tsukada. 61-72 [doi]
- An interoperable usage management frameworkPramod A. Jamkhedkar, Gregory L. Heileman, Christopher C. Lamb. 73-88 [doi]