Abstract is missing.
- Preserving Privacy in Online Social NetworksFatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi. 1-13 [doi]
- TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic ElectionsJordi Pujol Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs. 14-22 [doi]
- Automated Verification of Block Cipher Modes of Operation, an Improved MethodMartin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini. 23-31 [doi]
- SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart CardsNicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra. 32-48 [doi]
- Private Identification of RFID TagsBehzad Malek, Ali Miri. 49-61 [doi]
- Threshold Encryption into Multiple CiphertextsMartin Stanek. 62-72 [doi]
- A Novel Commutative Blinding Identity Based Encryption SchemeYu Chen, Song Luo, Jian-bin Hu, Zhong Chen. 73-89 [doi]
- A Related-Key Attack on Block Ciphers with Weak Recurrent Key SchedulesMarina Pudovkina. 90-101 [doi]
- A Computational Indistinguishability Logic for the Bounded Storage ModelGilles Barthe, Mathilde Duclos, Yassine Lakhnech. 102-117 [doi]
- Preventing the Cluster Formation Attack against the Hierarchical OLSR ProtocolGimer Cervera, Michel Barbeau, Joaquín García-Alfaro, Evangelos Kranakis. 118-131 [doi]
- Secret Key Establishment over Noisy ChannelsHadi Ahmadi, Reihaneh Safavi-Naini. 132-147 [doi]
- Formal Specification and Validation of Security PoliciesTony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner. 148-163 [doi]
- Vote-Independence: A Powerful Privacy Notion for Voting ProtocolsJannik Dreier, Pascal Lafourcade, Yassine Lakhnech. 164-180 [doi]
- Black-Box Property of Cryptographic Hash FunctionsMichal Rjasko. 181-193 [doi]
- Phishing Detection with Popular Search Engines: Simple and EffectiveJun Ho Huh, Hyoungshick Kim. 194-207 [doi]
- A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in ProgressEugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris. 208-217 [doi]
- A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in ProgressMichel Embe Jiague, Marc Frappier, Frédéric Gervais, Régine Laleau, Richard St.-Denis. 218-226 [doi]
- Specification and Verification of Access Control Policies in EB3SEC: Work in ProgressPierre Konopacki, Hakim Belhaouari, Marc Frappier, Régine Laleau. 227-233 [doi]
- A Metamodel of the B Modeling of Access-Control Policies: Work in ProgressJérémy Milhau, Marc Frappier, Régine Laleau. 234-241 [doi]
- Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in ProgressWiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro. 242-251 [doi]