Abstract is missing.
- How to Steal a Botnet and What Can Happen When You DoRichard A. Kemmerer. 1 [doi]
- A User-Mode-Kernel-Mode Co-operative Architecture for Trustable ComputingWenbo Mao. 2 [doi]
- Security Evaluation of a DPA-Resistant S-Box Based on the Fourier TransformYang Li, Kazuo Sakiyama, Shin-ichi Kawamura, Yuichi Komano, Kazuo Ohta. 3-16 [doi]
- Security Analysis of the GF-NLFSR Structure and Four-Cell Block CipherWenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang. 17-31 [doi]
- The rakaposhi Stream CipherCarlos Cid, Shinsaku Kiyomoto, Jun Kurihara. 32-46 [doi]
- Design of Reliable and Secure Multipliers by Multilinear Arithmetic CodesZhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Joshi. 47-62 [doi]
- Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded SystemsManuel Koschuch, Johann Großschädl, Dan Page, Philipp Grabher, Matthias Hudler, Michael Krüger. 63-79 [doi]
- Online/Offline Ring Signature SchemeJoseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou. 80-90 [doi]
- Policy-Controlled SignaturesPairat Thorncharoensri, Willy Susilo, Yi Mu. 91-106 [doi]
- Public Key Encryption without Random Oracle Made Truly PracticalPuwen Wei, Xiaoyun Wang, Yuliang Zheng. 107-120 [doi]
- A Public-Key Traitor Tracing Scheme with an Optimal Transmission RateYi-Ruei Chen, Wen-Guey Tzeng. 121-134 [doi]
- Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor NetworksYanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao. 135-149 [doi]
- Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply ChainsShaoying Cai, Tieyan Li, Changshe Ma, Yingjiu Li, Robert H. Deng. 150-164 [doi]
- Biometric-Based Non-transferable Anonymous CredentialsMarina Blanton, William M. P. Hudelson. 165-180 [doi]
- Secure Remote Execution of Sequential ComputationsGhassan Karame, Mario Strasser, Srdjan Capkun. 181-197 [doi]
- Architecture- and OS-Independent Binary-Level Dynamic Test GenerationGen Li, Kai Lu, Ying Zhang, Xicheng Lu, Wei Zhang. 198-210 [doi]
- Measuring Information Flow in Reactive ProcessesChunyan Mu. 211-225 [doi]
- Trusted Isolation Environment: An Attestation Architecture with Usage Control ModelAnbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang, Zhong Chen. 226-240 [doi]
- Denial-of-Service Attacks on Host-Based Generic UnpackersLimin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia. 241-253 [doi]
- Predictive Pattern Matching for Scalable Network Intrusion DetectionLucas Vespa, Mini Mathew, Ning Weng. 254-267 [doi]
- Deterministic Finite Automata Characterization for Memory-Based Pattern MatchingLucas Vespa, Ning Weng. 268-282 [doi]
- A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection ThresholdZhengmin Xia, Songnian Lu, Jianhua Li, Aixin Zhang. 283-292 [doi]
- User-Assisted Host-Based Detection of Outbound Malware TrafficHuijun Xiong, Prateek Malhotra, Deian Stefan, Chehai Wu, Danfeng Yao. 293-307 [doi]
- Assessing Security Risk to a Network Using a Statistical Model of Attacker Community CompetenceTomas Olsson. 308-324 [doi]
- Using the (Open) Solaris Service Management Facility as a Building Block for System SecurityChristoph L. Schuba. 325-335 [doi]
- IntFinder: Automatically Detecting Integer Bugs in x86 Binary ProgramPing Chen, Hao Han, Yi Wang, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie. 336-345 [doi]
- A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper]Gunmeet Singh, Sarbjeet Singh. 346-358 [doi]
- GUC-Secure Join Operator in Distributed Relational DatabaseYuan Tian, Hao Zhang. 370-384 [doi]
- TSM-Trust: A Time-Cognition Based Computational Model for Trust DynamicsGuangquan Xu, Zhiyong Feng, Xiaohong Li, Hutong Wu, Yongxin Yu, Shizhan Chen, Guozheng Rao. 385-395 [doi]
- Bring Efficient Connotation Expressible Policies to Trust ManagementYan Zhang, Zhengde Zhai, Dengguo Feng. 396-410 [doi]
- A User Trust-Based Collaborative Filtering Recommendation AlgorithmFuzhi Zhang, Long Bai, Feng Gao. 411-424 [doi]
- Fingerprinting Attack on the Tor Anonymity SystemYi Shi, Kanta Matsuura. 425-438 [doi]
- Proactive Verifiable Linear Integer Secret Sharing SchemeChuangui Ma, Xiaofei Ding. 439-448 [doi]
- A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform ApproachMitra Fatemi, Taraneh Eghlidos, Mohammad Reza Aref. 449-458 [doi]
- Digital Audio Watermarking Technique Using Pseudo-Zernike MomentsXiangyang Wang, Tianxiao Ma, Panpan Niu. 459-473 [doi]
- An Image Sanitizing Scheme Using Digital WatermarkingMasatoshi Noguchi, Manabu Inuma, Rie Shigetomi, Hideki Imai. 474-482 [doi]
- Adaptive and Composable Oblivious Transfer Protocols (Short Paper)Huafei Zhu, Feng Bao. 483-492 [doi]
- Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data AggregationLicheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang. 493-502 [doi]