Abstract is missing.
- A Flexible Software Development and Emulation Framework for ARM TrustZoneJohannes Winter, Paul Wiegele, Martin Pirker, Ronald Tögl. 1-15 [doi]
- Building General Purpose Security Services on Trusted ComputingChunhua Chen 0002, Chris J. Mitchell, Shaohua Tang. 16-31 [doi]
- Enforcing Sticky Policies with TPM and VirtualizationGina Kounga, Liqun Chen. 32-47 [doi]
- Mass Transit Ticketing with NFC Mobile PhonesJan-Erik Ekberg, Sandeep Tamrakar. 48-65 [doi]
- Anonymous Ticketing for NFC-Enabled Mobile PhonesDavid Derler, Klaus Potzmader, Johannes Winter, Kurt Dietrich. 66-83 [doi]
- Some Improvements to the Cost-Based Framework for Analyzing Denial of Service AttacksQinggang Yue, Feng Liu, Rui Xue. 84-101 [doi]
- Fault Detection of the MacGuffin Cipher against Differential Fault AttackWei Li 0013, Dawu Gu, Zhiqiang Liu, Ya Liu 0001, Xiaohu Huang. 102-112 [doi]
- Computationally Sound Symbolic Analysis of EAP-TNC ProtocolZijian Zhang, Liehuang Zhu, Feng Wang, Lejian Liao, Cong Guo, Hongyuan Wang. 113-128 [doi]
- A Technique for Remote Detection of Certain Virtual Machine MonitorsChristopher Jämthagen, Martin Hell, Ben J. M. Smeets. 129-137 [doi]
- Indifferentiability of Domain Extension Modes for Hash FunctionsYiyuan Luo, Xuejia Lai, Zheng Gong. 138-155 [doi]
- Multicollisions and Graph-Based Hash FunctionsKimmo Halunen. 156-167 [doi]
- A General, Flexible and Efficient Proof of Inclusion and ExclusionKun Peng. 168-183 [doi]
- MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature SchemeDanilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski. 184-203 [doi]
- Multifactor Authenticated Key RenewalShin'ichiro Matsuo, Daisuke Moriyama, Moti Yung. 204-220 [doi]
- Restricted Identification Scheme and Diffie-Hellman Linking ProblemMiroslaw Kutylowski, Lukasz Krzywiecki, Przemyslaw Kubiak, Michal Koza. 221-238 [doi]
- Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor NetworksDong Hao, Avishek Adhikari, Kouichi Sakurai. 239-257 [doi]
- Hash Chains at the Basis of a Secure Reactive Routing ProtocolThouraya Bouabana-Tebibel. 258-270 [doi]
- Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAMPatrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik. 271-288 [doi]
- A Performance Analysis of Identity-Based Encryption SchemesPengqi Cheng, Yan Gu, Zihong Lv, Jianfei Wang, Wenlei Zhu, Zhen Chen, Jiwei Huang. 289-303 [doi]
- A (Corrected) DAA Scheme Using Batch Proof and VerificationErnie Brickell, Liqun Chen, Jiangtao Li 0001. 304-337 [doi]
- DAA Protocol Analysis and VerificationYu Qin, XiaoBo Chu, Dengguo Feng, Wei Feng. 338-350 [doi]