Abstract is missing.
- Fraud Within Asymmetric Multi-hop Cellular NetworksGildas Avoine. 1-15 [doi]
- Protecting Secret Data from Insider AttacksDavid Dagon, Wenke Lee, Richard J. Lipton. 16-30 [doi]
- Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and FunnelingPaul C. van Oorschot, Stuart G. Stubblebine. 31-43 [doi]
- Trust and Swindling on the InternetBezalel Gavish. 44 [doi]
- Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures)Fangguo Zhang, Willy Susilo, Yi Mu. 45-56 [doi]
- Time Capsule SignatureYevgeniy Dodis, Dae Hyun Yum. 57-71 [doi]
- Policy-Based Cryptography and ApplicationsWalid Bagga, Refik Molva. 72-87 [doi]
- A Chat at the Old Phishin HoleRichard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo. 88 [doi]
- Modeling and Preventing Phishing AttacksMarkus Jakobsson. 89 [doi]
- Helping the Phish Detect the LureSteven Myers. 90 [doi]
- Who d Phish from the Summit of Kilimanjaro?Richard Clayton. 91-92 [doi]
- A Privacy-Protecting Coupon SystemLiqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider 0002, Michael Steiner. 93-108 [doi]
- Testing Disjointness of Private DatasetsAggelos Kiayias, Antonina Mitrofanova. 109-124 [doi]
- RFID Traceability: A Multilayer ProblemGildas Avoine, Philippe Oechslin. 125-140 [doi]
- Information-Theoretic Security Analysis of Physical Uncloneable FunctionsPim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey. 141-155 [doi]
- Risk Assurance for Hedge Funds Using Zero Knowledge ProofsMichael Szydlo. 156-171 [doi]
- Probabilistic Escrow of Financial Transactions with Cumulative Threshold DisclosureStanislaw Jarecki, Vitaly Shmatikov. 172-187 [doi]
- Views, Reactions and Impact of Digitally-Signed Mail in e-CommerceSimson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller. 188-202 [doi]
- Securing Sensitive Data with the Ingrian DataSecure PlatformAndrew Koyfman. 203-210 [doi]
- Ciphire Mail Email Encryption and AuthenticationLars Eilebrecht. 211-224 [doi]
- A User-Friendly Approach to Human Authentication of MessagesJeff King, André L. M. dos Santos. 225-239 [doi]
- Approximate Message Authentication and Biometric Entity AuthenticationGiovanni Di Crescenzo, R. F. Graveman, Renwei Ge, Gonzalo R. Arce. 240-254 [doi]
- Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space ModelAybek Mukhamedov, Steve Kremer, Eike Ritter. 255-269 [doi]
- Achieving Fairness in Private Contract NegotiationKeith B. Frikken, Mikhail J. Atallah. 270-284 [doi]
- Small Coalitions Cannot Manipulate VotingEdith Elkind, Helger Lipmaa. 285-297 [doi]
- Efficient Privacy-Preserving Protocols for Multi-unit AuctionsFelix Brandt, Tuomas Sandholm. 298-312 [doi]
- Event Driven Private CountersEu-Jin Goh, Philippe Golle. 313-327 [doi]
- Secure Distributed ::::Human:::: ComputationCraig Gentry, Zulfikar Ramzan, Stuart G. Stubblebine. 328-332 [doi]
- Secure Multi-attribute Procurement AuctionKoutarou Suzuki, Makoto Yokoo. 333-335 [doi]
- Audit File Reduction Using N-Gram ModelsFernando GodÃnez, Dieter Hutter, Raul Monroy. 336-340 [doi]
- Interactive Diffie-Hellman Assumptions with Applications to Password-Based AuthenticationMichel Abdalla, David Pointcheval. 341-356 [doi]
- Secure Biometric Authentication for Weak Computational DevicesMikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia. 357-371 [doi]
- Panel Summary: Incentives, Markets and Information SecurityAllan Friedman. 372-373 [doi]