Abstract is missing.
- Time and Space Efficient Algorithms for Two-Party Authenticated Data StructuresCharalampos Papamanthou, Roberto Tamassia. 1-15 [doi]
- New Construction of Group Secret Handshakes Based on PairingsLan Zhou, Willy Susilo, Yi Mu. 16-30 [doi]
- ::::n:::: PAKE::: + :::: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different PasswordsZhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel. 31-43 [doi]
- An Efficient Password-Only Two-Server Authenticated Key Exchange SystemHaimin Jin, Duncan S. Wong, Yinlong Xu. 44-56 [doi]
- Formal Definition and Construction of Nominative SignatureDennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo. 57-68 [doi]
- Short Group Signature Without Random OraclesXiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin. 69-82 [doi]
- (Convertible) Undeniable Signatures Without Random OraclesTsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo. 83-97 [doi]
- A New Dynamic Accumulator for Batch UpdatesPeishun Wang, Huaxiong Wang, Josef Pieprzyk. 98-112 [doi]
- Preventing Unofficial Information PropagationZhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon. 113-125 [doi]
- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and InteractionB. John Oommen, Ebaa Fayyoumi. 126-140 [doi]
- Privacy Protection on Multiple Sensitive AttributesZhen Li, Xiaojun Ye. 141-152 [doi]
- Audio Watermarking Algorithm Based on Centroid and Statistical FeaturesXiaoming Zhang, Xiong Yin. 153-163 [doi]
- A Semi-blind Watermarking Based on Discrete Wavelet TransformChin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu. 164-176 [doi]
- On the Design of Fast Prefix-Preserving IP Address Anonymization SchemeQianli Zhang, Jilong Wang, Xing Li. 177-188 [doi]
- High Speed Modular Divider Based on GCD AlgorithmAbdulah Abdulah Zadeh. 189-200 [doi]
- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern SetZongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li. 201-215 [doi]
- Compact and Secure Design of Masked AES S-BoxBabak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani. 216-229 [doi]
- Boudot s Range-Bounded Commitment Scheme RevisitedZhengjun Cao, Lihua Liu. 230-238 [doi]
- Toward Practical Anonymous Rerandomizable RCCA Secure EncryptionsRui Xue, Dengguo Feng. 239-253 [doi]
- Secure Multiparty Computation of DNFKun Peng. 254-268 [doi]
- Square Like Attack on CamelliaDuo Lei, Chao Li, Keqin Feng. 269-283 [doi]
- Differential Fault Analysis on CLEFIAHua Chen, Wenling Wu, Dengguo Feng. 284-295 [doi]
- Extending FORK-256 Attack to the Full Hash FunctionScott Contini, Krystian Matusiewicz, Josef Pieprzyk. 296-305 [doi]
- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI StandardJiqiang Lu. 306-318 [doi]
- A Framework for Game-Based Security ProofsDavid Nowak. 319-333 [doi]
- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer SecurityXiaowei Huang, Li Jiao, Weiming Lu. 334-349 [doi]
- Modeling Agreement Problems in the Universal Composability FrameworkMasayuki Terada, Kazuki Yoneyama, Sadayuki Hongo, Kazuo Ohta. 350-361 [doi]
- A System Architecture for History-Based Access Control for XML DocumentsPatrick Röder, Omid Tafreschi, Fredrik Mellgren, Claudia M. Eckert. 362-374 [doi]
- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile ComputingMooseop Kim, Jaecheol Ryou. 375-385 [doi]
- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication PoliciesAnna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis. 386-397 [doi]
- A Novel Approach for Untrusted Code ExecutionYan Wen, Jinjing Zhao, Huaimin Wang. 398-411 [doi]
- Detection and Diagnosis of Control InterceptionChang-Hsien Tsai, Shih-Kun Huang. 412-426 [doi]
- BIOS Security Analysis and a Kind of Trusted BIOSZhenLiu Zhou, RongSheng Xu. 427-437 [doi]
- Collecting Autonomous Spreading Malware Using High-Interaction HoneypotsJianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou. 438-451 [doi]
- DDoS Attack Detection Algorithms Based on Entropy ComputingLiying Li, Jianying Zhou, Ning Xiao. 452-466 [doi]
- Firewall for Dynamic IP Address in Mobile IPv6Ying Qiu, Feng Bao, Jianying Zhou. 467-479 [doi]
- Application of the PageRank Algorithm to Alarm GraphsJames J. Treinen, Ramakrishna Thurimella. 480-494 [doi]
- Drive-By PharmingSid Stamm, Zulfikar Ramzan, Markus Jakobsson. 495-506 [doi]