Abstract is missing.
- Application Security - Myth Or Reality?William J. Caelli. 1-10 [doi]
- Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu. 11-19 [doi]
- A Linear Analysis of Blowfish and KhufuJorge Nakahara Jr.. 20-32 [doi]
- Related-Key Rectangle Attack on 43-Round SHACAL-2Gaoli Wang. 33-42 [doi]
- On the Ability of AES S-Boxes to Secure Against Correlation Power AnalysisZhenglin Liu, Xu Guo, Yi-Cheng Chen, Yu Han, Xuecheng Zou. 43-50 [doi]
- A Sanitizable Signature Scheme with AggregationTetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka. 51-64 [doi]
- A Novel Verifiably Encrypted Signature Scheme Without Random OracleJianhong Zhang, Jian Mao. 65-78 [doi]
- Certificate Based (Linkable) Ring SignatureMan Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen. 79-92 [doi]
- An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess s SchemeSaeran Kwon, Sang Ho Lee. 93-104 [doi]
- On the Sequentiality of Three Optimal Structured Multisignature SchemesZuhua Shao. 105-115 [doi]
- Secure Feedback Service in Wireless Sensor NetworksDi Ma. 116-128 [doi]
- An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography ProtocolsZhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang. 129-144 [doi]
- Practical Uses of Virtual Machines for Protection of Sensitive User DataPeter C. S. Kwan, Glenn Durfee. 145-161 [doi]
- Formalization of RBAC Policy with Object Class HierarchyJung-Hwa Chae, Nematollaah Shiri. 162-176 [doi]
- Privacy-Preserving Credentials Upon Trusted Computing Augmented ServersYanjiang Yang, Robert H. Deng, Feng Bao. 177-192 [doi]
- Two-Party Privacy-Preserving Agglomerative Document ClusteringChunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai. 193-208 [doi]
- Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-AuctionKun Peng, Ed Dawson. 209-224 [doi]
- How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension MethodYoo-Jin Baek, Ihor Vasyltsov. 225-237 [doi]
- Secure Signed Radix- ::::r:::: Recoding Methods for Constrained-Embedded DevicesDong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim. 238-253 [doi]
- Some Efficient Algorithms for the Final Exponentiation of ::::eta:::: :: ::::T:::: :: PairingMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto. 254-268 [doi]
- Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve CryptosystemsPradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar. 269-283 [doi]
- Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery SystemsRobert H. Deng, Yanjiang Yang. 284-300 [doi]
- Scalable Group Key Management Protocol Based on Key Material Transmitting TreeMinghui Zheng, Guohua Cui, Muxiang Yang, Jun Li. 301-313 [doi]
- A Time-Based Key Management Protocol for Wireless Sensor NetworksJiyong Jang, Taekyoung Kwon, JooSeok Song. 314-328 [doi]
- Identity-Based Threshold Decryption RevisitedShengli Liu, Kefei Chen, Weidong Qiu. 329-343 [doi]
- Visual Cryptography Schemes with Dihedral Group Access Structure for Many ImagesMiyuki Uno, M. Kano. 344-359 [doi]