Abstract is missing.
- Phoolproof Phishing PreventionBryan Parno, Cynthia Kuo, Adrian Perrig. 1-19 [doi]
- A Protocol for Secure Public Instant MessagingMohammad Mannan, Paul C. van Oorschot. 20-35 [doi]
- Using Automated Banking Certificates to Detect Unauthorised Financial TransactionsC. Corzo, F. Corzo S., N. Zhang, A. Carpenter. 36-51 [doi]
- Privacy in Encrypted Content Distribution Using Private Broadcast EncryptionAdam Barth, Dan Boneh, Brent Waters. 52-64 [doi]
- A Private Stable Matching AlgorithmPhilippe Golle. 65-80 [doi]
- Private Policy NegotiationKlaus Kursawe, Gregory Neven, Pim Tuyls. 81-95 [doi]
- Uncheatable Reputation for Distributed Computation MarketsBogdan Carbunar, Radu Sion. 96-110 [doi]
- An Efficient Publicly Verifiable Mix-Net for Long InputsJun Furukawa, Kazue Sako. 111-125 [doi]
- Auditable Privacy: On Tamper-Evident Mix NetworksJong Youl Choi, Philippe Golle, Markus Jakobsson. 126-141 [doi]
- A Practical Implementation of Secure Auctions Based on Multiparty Integer ComputationPeter Bogetoft, Ivan Damgård, Thomas Jakobsen, Kurt Nielsen, Jakob Pagter, Tomas Toft. 142-147 [doi]
- Defeating Malicious Servers in a Blind Signatures Based Voting SystemSébastien Canard, Matthieu Gaud, Jacques Traoré. 148-153 [doi]
- Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-ZhengYvo Desmedt, Tanja Lange. 154-159 [doi]
- Credit Transfer for Market-Based InfrastructureTyler Close. 160-165 [doi]
- A Note on Chosen-Basis Decisional Diffie-Hellman AssumptionsMichael Szydlo. 166-170 [doi]
- Cryptanalysis of a Partially Blind Signature Scheme or How to Make 100 Bills with 1 and 2 OnesGwenaëlle Martinet, Guillaume Poupard, Philippe Sola. 171-176 [doi]
- A Generic Construction for Token-Controlled Public Key EncryptionDavid Galindo, Javier Herranz. 177-190 [doi]
- Timed-Release and Key-Insulated Public Key EncryptionJung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov. 191-205 [doi]
- Conditional Encrypted Mapping and Comparing Encrypted NumbersIan F. Blake, Vladimir Kolesnikov. 206-220 [doi]
- Revisiting Oblivious Signature-Based EnvelopesSamad Nasserian, Gene Tsudik. 221-235 [doi]
- Provably Secure Electronic Cash Based on Blind Multisignature SchemesYoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro. 236-250 [doi]
- Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear PairingsXiaofeng Chen, Fangguo Zhang, Yi Mu, Willy Susilo. 251-265 [doi]
- Privacy-Protecting Coupon System RevisitedLan Nguyen. 266-280 [doi]
- Efficient Broadcast Encryption Scheme with Log-Key StorageYong Ho Hwang, Pil Joong Lee. 281-295 [doi]
- Efficient Correlated Action SelectionMikhail J. Atallah, Marina Blanton, Keith B. Frikken, Jiangtao Li. 296-310 [doi]
- Efficient Cryptographic Protocols Realizing E-Markets with Price DiscriminationAggelos Kiayias, Moti Yung. 311-325 [doi]