Abstract is missing.
- An Evenhanded Certified Email System for Contract SigningKenji Imamoto, Jianying Zhou, Kouichi Sakurai. 1-13 [doi]
- Efficient ID-Based Optimistic Fair Exchange with Provable SecurityZhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou. 14-26 [doi]
- On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation ProtocolJ. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti. 27-39 [doi]
- Generic, Optimistic, and Efficient Schemes for Fair Certified Email DeliveryGuilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai. 40-52 [doi]
- Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable SecurityShuhong Wang, Feng Bao, Robert H. Deng. 53-60 [doi]
- On Delegatability of Four Designated Verifier SignaturesYong Li 0002, Helger Lipmaa, Dingyi Pei. 61-71 [doi]
- PIATS: A Partially Sanitizable Signature SchemeTetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka. 72-83 [doi]
- Ciphertext Comparison, a New Solution to the Millionaire ProblemKun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee. 84-96 [doi]
- Private Itemset Support CountingSven Laur, Helger Lipmaa, Taneli Mielikäinen. 97-111 [doi]
- Visual Cryptographic Protocols Using the Trusted InitializerHidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka. 112-122 [doi]
- Admissible Interference by Typing for Cryptographic ProtocolsAlaaeddine Fellah, John Mullins. 123-135 [doi]
- On the Security Bounds of CMC, EME, EME:::+::: and EME:::*::: Modes of OperationRaphael Chung-Wei Phan, Bok-Min Goi. 136-146 [doi]
- On the Security of Encryption Modes of MD4, MD5 and HAVALJongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee. 147-158 [doi]
- Cryptanalysis of PASS II and MiniPassBok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi. 159-168 [doi]
- Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic CurvesYasuyuki Sakai, Kouichi Sakurai. 169-180 [doi]
- Asymmetric Concurrent SignaturesKhanh Nguyen. 181-193 [doi]
- Generic Construction of (Identity-Based) Perfect Concurrent SignaturesSherman S. M. Chow, Willy Susilo. 194-206 [doi]
- Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation DomainsHuafei Zhu, Feng Bao, Robert H. Deng. 207-219 [doi]
- Session Table Architecture for Defending SYN Flood AttackXin Li, Zhenzhou Ji, Mingzeng Hu. 220-230 [doi]
- A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS AttacksSong Huang, Ling Zhang, Shou-Ling Dong. 231-242 [doi]
- Port Scan Behavior Diagnosis by ClusteringLanjia Wang, Hai-Xin Duan, Xing Li. 243-255 [doi]
- Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian. 256-268 [doi]
- Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient EmailsWei Wei, Xuhua Ding, Kefei Chen. 269-279 [doi]
- Secure Multicast Using Proxy EncryptionYun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang. 280-290 [doi]
- Efficient and Non-interactive Timed-Release EncryptionJulien Cathalo, Benoît Libert, Jean-Jacques Quisquater. 291-303 [doi]
- Security Properties of Two Authenticated Conference Key Agreement ProtocolsQiang Tang, Chris J. Mitchell. 304-314 [doi]
- Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving AnonymityEun-Jun Yoon, Kee-Young Yoo. 315-322 [doi]
- Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG EnvironmentSangjin Kim, Hoonjung Lee, Heekuck Oh. 323-335 [doi]
- Enforce Mandatory Access Control Policy on XML DocumentsLan Li, Xinghao Jiang, Jianhua Li. 336-349 [doi]
- Network Access Control for Mobile Ad-Hoc NetworksPan Wang, Peng Ning, Douglas S. Reeves. 350-362 [doi]
- Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted HardwareDebra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis. 363-375 [doi]
- Authenticating Query Results in Data PublishingDi Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou. 376-388 [doi]
- Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 StreamTieyan Li, Huafei Zhu, Yongdong Wu. 389-401 [doi]
- Batching SSL/TLS Handshake ImprovedFang Qi, Weijia Jia, Feng Bao, Yongdong Wu. 402-413 [doi]
- Achieving Efficient Conjunctive Keyword Searches over Encrypted DataLucas Ballard, Seny Kamara, Fabian Monrose. 414-426 [doi]
- Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for AudioDavid Megías, Jordi Herrera-Joancomartí, Julià Minguillón. 427-440 [doi]
- Reversible Watermark with Large Capacity Using the Predictive CodingMinoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka. 441-453 [doi]
- PCAV: Internet Attack Visualization on Parallel CoordinatesHyunsang Choi, Heejo Lee. 454-466 [doi]
- Implementation of Packet Filter Configurations Anomaly Detection System with SIERRAYi Yin, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naoshi Takahashi. 467-480 [doi]
- D_DIPS: An Intrusion Prevention System for Database SecurityJiazhu Dai, Huaikou Miao. 481-490 [doi]