Abstract is missing.
- Quantifying Resistance to the Sybil AttackN. Boris Margolin, Brian Neil Levine. 1-15 [doi]
- Evaluating the Wisdom of Crowds in Assessing Phishing WebsitesTyler Moore, Richard Clayton. 16-30 [doi]
- Don t Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity SchemesJon McLachlan, Nicholas Hopper. 31-46 [doi]
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)Shaoquan Jiang, Reihaneh Safavi-Naini. 47-52 [doi]
- Revisiting Pairing Based Group Key ExchangeYvo Desmedt, Tanja Lange. 53-68 [doi]
- Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic GroupsShuhua Wu, Yuefei Zhu. 69-82 [doi]
- A Practical Universal Circuit Construction and Secure Evaluation of Private FunctionsVladimir Kolesnikov, Thomas Schneider. 83-97 [doi]
- Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile AgentsVandana Gunupudi, Stephen R. Tate. 98-112 [doi]
- PBS: Private Bartering SystemsKeith B. Frikken, Lukasz Opyrchal. 113-127 [doi]
- Breaking Legacy Banking Standards with Special-Purpose HardwareTim Güneysu, Christof Paar. 128-140 [doi]
- ePassport: Securing International Contacts with Contactless ChipsGildas Avoine, Kassem Kalach, Jean-Jacques Quisquater. 141-155 [doi]
- Good Variants of HB:::+::: Are Hard to FindHenri Gilbert, Matthew J. B. Robshaw, Yannick Seurin. 156-170 [doi]
- Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract)Shane Balfe, Kenneth G. Paterson. 171-175 [doi]
- Weighing Down The Unbearable Lightness of PIN Cracking Mohammad Mannan, Paul C. van Oorschot. 176-181 [doi]
- Phishwish: A Stateless Phishing Filter Using Minimal RulesDebra L. Cook, Vijay K. Gurbani, Michael Daniluk. 182-186 [doi]
- Competition and Fraud in Online Advertising MarketsBob Mungamuru, Stephen Weis. 187-191 [doi]
- Identity Theft: Much Too Easy? A Study of Online Systems in NorwayAndré N. Klingsheim, Kjell Jørgen Hole. 192-196 [doi]
- A Proof of Concept Attack against Norwegian Internet Banking SystemsYngve Espelid, Lars-Helge Netland, André N. Klingsheim, Kjell Jørgen Hole. 197-201 [doi]
- Improvement of Efficiency in (Unconditional) Anonymous Transferable E-CashSébastien Canard, Aline Gouget, Jacques Traoré. 202-214 [doi]
- Proactive RSA with Non-interactive SigningStanislaw Jarecki, Josh Olsen. 215-230 [doi]
- Fair Traceable Multi-Group SignaturesVicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung. 231-246 [doi]
- Identity-Based Online/Offline EncryptionFuchun Guo, Yi Mu, Zhide Chen. 247-261 [doi]
- Countermeasures against Government-Scale Monetary ForgeryAlessandro Acquisti, Nicolas Christin, Bryan Parno, Adrian Perrig. 262-266 [doi]
- OpenPGP-Based Financial Instruments and Dispute ArbitrationDaniel A. Nagy, Nadzeya V. Shakel. 267-271 [doi]
- An Efficient Anonymous Credential SystemNorio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto. 272-286 [doi]
- Practical Anonymous Divisible E-Cash from Bounded AccumulatorsMan Ho Au, Willy Susilo, Yi Mu. 287-301 [doi]
- Panel: Usable Cryptography: Manifest Destiny or Oxymoron?Mary Ellen Zurko, Andrew S. Patrick. 302-306 [doi]
- Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report)Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung. 307-313 [doi]
- Securing Web Banking ApplicationsAntonio San Martino, Xavier Perramon. 314-315 [doi]
- Privacy Threats in Online Stock QuotesPeter Williams. 316-317 [doi]
- A Platform for OnBoard CredentialsN. Asokan, Jan-Erik Ekberg. 318-320 [doi]
- ST&E Is the Most Cost Effective Measure for Comply with Payment Card Industry (PCI) Data Security StandardKen Huang, Paul Douthit. 321-322 [doi]
- Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace AnonymizationWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham. 323-324 [doi]