Abstract is missing.
- Verification of Integrity and Secrecy Properties of a Biometric Authentication ProtocolAnongporn Salaiwarakul, Mark Dermot Ryan. 1-13 [doi]
- An On-Line Secure E-Passport ProtocolVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang. 14-28 [doi]
- Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-FriendlyFrederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi. 29-44 [doi]
- 1-out-of-Raylin Tso, Takeshi Okamoto, Eiji Okamoto. 45-55 [doi]
- A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication SchemesQiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval. 56-70 [doi]
- Private Query on Encrypted Data in Multi-user SettingsFeng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang. 71-85 [doi]
- Towards Tamper Resistant Code Encryption: Practice and ExperienceJan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere. 86-100 [doi]
- A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh s HIBE SchemeJong Hwan Park, Dong-Hoon Lee. 101-115 [doi]
- RSA Moduli with a Predetermined Portion: Techniques and ApplicationsMarc Joye. 116-130 [doi]
- Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-OffsJin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma. 131-145 [doi]
- Secure Cryptographic Precomputation with Insecure MemoryPatrick P. Tsang, Sean W. Smith. 146-160 [doi]
- Securing Peer-to-Peer Distributions for Mobile DevicesAndré Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan. 161-175 [doi]
- Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS AttacksKeun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim. 176-187 [doi]
- Combating Spam and Denial-of-Service Attacks with Trusted Puzzle SolversPatrick P. Tsang, Sean W. Smith. 188-202 [doi]
- PROBE: A Process Behavior-Based Host Intrusion Prevention SystemMinjin Kwon, Kyoochang Jeong, Heejo Lee. 203-217 [doi]
- Towards the World-Wide Quantum NetworkQuoc-Cuong Le, Patrick Bellot, Akim Demaille. 218-232 [doi]
- Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted SoftwareAndrew Brown, Mark Ryan. 233-247 [doi]
- Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple DomainsXingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu. 248-262 [doi]
- Privacy of Recent RFID Authentication ProtocolsKhaled Ouafi, Raphael C.-W. Phan. 263-277 [doi]
- A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy ProtectionJihwan Lim, Heekuck Oh, Sangjin Kim. 278-289 [doi]
- An Efficient Countermeasure against Side Channel Attacks for Pairing ComputationMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto. 290-303 [doi]
- Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd CharacteristicKeisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi. 304-318 [doi]
- Secure Computation of the Vector Dominance ProblemJin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk. 319-333 [doi]
- Rational Secret Sharing with Repeated GamesShaik Maleka, Amjed Shareef, C. Pandu Rangan. 334-346 [doi]
- Distributed Private Matching and Set OperationsQingsong Ye, Huaxiong Wang, Josef Pieprzyk. 347-360 [doi]
- Computational Soundness of Non-Malleable CommitmentsDavid Galindo, Flavio D. Garcia, Peter van Rossum. 361-376 [doi]
- Square Attack on Reduced-Round Zodiac CipherWen Ji, Lei Hu. 377-391 [doi]
- Analysis of Zipper as a Hash FunctionPin Lin, Wenling Wu, Chuankun Wu, Tian Qiu. 392-403 [doi]
- On the Importance of the Key Separation Principle for Different Modes of OperationDanilo Gligoroski, Suzana Andova, Svein J. Knapskog. 404-418 [doi]