Abstract is missing.
- Constructive Cryptography - A PrimerUeli Maurer. 1 [doi]
- Security Mechanisms with Selfish Players in Wireless NetworksJean-Pierre Hubaux. 2 [doi]
- Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security LaboratoryLorrie Faith Cranor. 3 [doi]
- Multichannel Protocols to Prevent Relay AttacksFrank Stajano, Ford-Long Wong, Bruce Christianson. 4-19 [doi]
- A Traceability Attack against e-PassportsTom Chothia, Vitaliy Smirnov. 20-34 [doi]
- Secure Computation with Fixed-Point NumbersOctavian Catrina, Amitabh Saxena. 35-50 [doi]
- Implementing a High-Assurance Smart-Card OSPaul A. Karger, David C. Toll, Elaine R. Palmer, Suzanne McIntosh, Samuel Weber, Jonathan W. Edwards. 51-65 [doi]
- Unlinkable Priced Oblivious Transfer with Rechargeable WalletsJan Camenisch, Maria Dubovitskaya, Gregory Neven. 66-81 [doi]
- Multiple Denominations in E-cash with Compact Transaction DataSébastien Canard, Aline Gouget. 82-97 [doi]
- What s in a Name?Joseph Bonneau, Mike Just, Greg Matthews. 98-113 [doi]
- Cryptographic Protocol Analysis of AN.ONBenedikt Westermann, Rolf Wendolsky, Lexi Pimenidis, Dogan Kesdogan. 114-128 [doi]
- A CDH-Based Ring Signature Scheme with Short Signatures and Public KeysSven Schäge, Jörg Schwenk. 129-142 [doi]
- Practical Private Set Intersection Protocols with Linear ComplexityEmiliano De Cristofaro, Gene Tsudik. 143-159 [doi]
- Design and Implementation of a Key-Lifecycle Management SystemMathias Björkqvist, Christian Cachin, Robert Haas, Xiao-Yu Hu, Anil Kurmus, René Pawlitzek, Marko Vukolic. 160-174 [doi]
- Measuring the Perpetrators and Funders of TyposquattingTyler Moore, Benjamin Edelman. 175-191 [doi]
- A Learning-Based Approach to Reactive SecurityAdam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett. 192-206 [doi]
- Embedded SFE: Offloading Server and Network Using Hardware TokensKimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003. 207-221 [doi]
- The Phish-Market Protocol: Securely Sharing Attack Data between CompetitorsTal Moran, Tyler Moore. 222-237 [doi]
- Building Incentives into TorTsuen-Wan Ngan, Roger Dingledine, Dan S. Wallach. 238-256 [doi]
- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot ElectionsAggelos Kiayias, Moti Yung. 257-271 [doi]
- Automatically Preparing Safe SQL QueriesPrithvi Bisht, A. Prasad Sistla, V. N. Venkatakrishnan. 272-288 [doi]
- PKI Layer Cake: New Collision Attacks against the Global X.509 InfrastructureDan Kaminsky, Meredith L. Patterson, Len Sassaman. 289-303 [doi]
- Three-Round Abuse-Free Optimistic Contract Signing with Everlasting SecrecyXiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, Kwangjo Kim. 304-311 [doi]
- Designing for Audit: A Voting Machine with a Tiny TCBRyan W. Gardner, Sujata Garera, Aviel D. Rubin. 312-319 [doi]
- Attacking of SmartCard-Based Banking Applications with JavaScript-Based RootkitsDaniel Bußmeyer, Felix Gröbert, Jörg Schwenk, Christoph Wegener. 320-327 [doi]
- Security Applications of Diodes with Unique Current-Voltage CharacteristicsUlrich Rührmair, Christian Jaeger, Christian Hilgers, Michael Algasinger, György Csaba, Martin Stutzmann. 328-335 [doi]
- Verified by Visa and MasterCard SecureCode: Or, How Not to Design AuthenticationSteven J. Murdoch, Ross J. Anderson. 336-342 [doi]
- All You Can Eat or Breaking a Real-World Contactless Payment SystemTimo Kasper, Michael Silbermann, Christof Paar. 343-350 [doi]
- Shoulder-Surfing Safe Login in a Partially Observable Attacker ModelToni Perkovic, Mario Cagalj, Nitesh Saxena. 351-358 [doi]
- Using Sphinx to Improve Onion Routing Circuit ConstructionAniket Kate, Ian Goldberg. 359-366 [doi]
- Secure Multiparty AESIvan Damgård, Marcel Keller. 367-374 [doi]
- Modulo Reduction for Paillier Encryptions and Application to Secure Statistical AnalysisJorge Guajardo, Bart Mennink, Berry Schoenmakers. 375-382 [doi]
- On Robust Key Agreement Based on Public Key AuthenticationFeng Hao. 383-390 [doi]
- A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line GuessingBogdan Groza, Marius Minea. 391-399 [doi]
- Signatures of ReputationJohn Bethencourt, Elaine Shi, Dawn Song. 400-407 [doi]
- Intention-Disguised Algorithmic TradingWilliam Yuen, Paul F. Syverson, Zhenming Liu, Christopher Thorpe. 408-415 [doi]
- When Information Improves Information SecurityJens Grossklags, Benjamin Johnson, Nicolas Christin. 416-423 [doi]
- BetterThanPin: Empowering Users to Fight Phishing (Poster)Teik Guan Tan. 424 [doi]
- Certification Intermediaries and the Alternative (Poster)Pern Hui Chia. 425 [doi]
- SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge ProofsSlawomir Grzonkowski. 426 [doi]
- Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc NetworksPino Caballero-Gil, Jezabel Molina-Gil, Cándido Caballero-Gil, Candelaria Hernández-Goya. 427 [doi]
- Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic ProtocolsLilia Georgieva. 428 [doi]
- hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted ComputersShujun Li, Ahmad-Reza Sadeghi, Roland Schmitz. 429 [doi]