Abstract is missing.
- Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access StructuresCarlo Blundo, Paolo D Arco, Vanesa Daza, Carles Padró. 1-17 [doi]
- Privacy Amplification Theorem for Noisy Main ChannelValeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky. 18-26 [doi]
- Efficient Kerberized Multicast in a Practical Distributed SettingGiovanni Di Crescenzo, Olga Kornievskaia. 27-45 [doi]
- Suitability of a Classical Analysis Method for E-commerce ProtocolsSigrid Gürgens, Javier Lopez. 46-62 [doi]
- HyppocratesCarlo Blundo, Paolo D Arco, Alfredo De Santis, Clemente Galdi. 63-80 [doi]
- Lenient/Strict Batch Verification in Several GroupsFumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi. 81-94 [doi]
- Absolute Privacy in VotingDmitri Asonov, Markus Schaal, Johann Christoph Freytag. 95-109 [doi]
- A Logical Model for Privacy ProtectionTsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang. 110-124 [doi]
- DISSECT: DIStribution for SECurity ToolEnriquillo Valdez, Moti Yung. 125-143 [doi]
- An Approach to the Obfuscation of Control-Flow of Sequential Computer ProgramsStanley Chow, Yuan Xiang Gu, Harold Johnson, Vladimir A. Zakharov. 144-155 [doi]
- A Practical and Effective Approach to Large-Scale Automated Linguistic SteganographyMark Chapman, George I. Davida, Marc Rennhard. 156-165 [doi]
- Robust New Method in Frequency Domain WatermarkingDavid Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra. 166-182 [doi]
- On the Complexity of Public-Key Certificate ValidationDiana Berbecaru, Antonio Lioy, Marius Marian. 183-203 [doi]
- Liability of Certification Authorities: A Juridical Point of ViewApollònia Martínez Nadal, Josep Lluís Ferrer-Gomila. 204-219 [doi]
- Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator BoardPawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott. 220-234 [doi]
- Elliptic Curve Arithmetic Using SIMDKazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro. 235-247 [doi]
- On the Hardware Implementation of the 3GPP Confidentiality and Integrity AlgorithmsKostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi. 248-265 [doi]
- Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware AcceleratorSheng-Bo Xu, Lejla Batina. 266-279 [doi]
- A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASHRainer Steinwandt, Willi Geiselmann, Thomas Beth. 280-293 [doi]
- Quadratic Relations for S-Boxes: Their Minimum Representations and BoundsRouto Terada, Paulo G. Pinheiro. 294-309 [doi]
- Approximate Power Roots in Z::m::Ismael Jiménez Calvo, Germán Sáez. 310-323 [doi]
- Securing Elliptic Curve Point Multiplication against Side-Channel AttacksBodo Möller. 324-334 [doi]
- A Flexible Role-Based Access Control Model for Multimedia Medical Image Database SystemsSofia K. Tzelepi, George Pangalos. 335-346 [doi]
- A Secure Publishing Service for Digital Libraries of XML DocumentsElisa Bertino, Barbara Carminati, Elena Ferrari. 347-362 [doi]
- An Optimistic Non-repudiation Protocol with Transparent Trusted Third PartyOlivier Markowitch, Steve Kremer. 363-378 [doi]
- Persistent Authenticated Dictionaries and Their ApplicationsAris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia. 379-393 [doi]
- Efficient Optimistic N-Party Contract Signing ProtocolJosep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger. 394-407 [doi]
- Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump ComparisonKoji Chida, Kunio Kobayashi, Hikaru Morita. 408-419 [doi]
- Oblivious Image Watermarking Robust against Scaling and Geometric DistortionsFrancesc Sebé, Josep Domingo-Ferrer. 420-432 [doi]
- Fingerprinting Text in Logical Markup LanguagesChristian Damsgaard Jensen. 433-445 [doi]
- SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic DeliveryAntonio Ruiz-Martínez, Gregorio Martínez Pérez, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta. 446-461 [doi]
- Efficient Transferable Cash with Group SignaturesIk Rae Jeong, Dong-Hoon Lee, Jong In Lim. 462-474 [doi]
- An Auditable Metering Scheme for Web Advertisement ApplicationsLiqun Chen, Wenbo Mao. 475-485 [doi]
- Broker-Based Secure Negotiation of Intellectual Property RightsJaime Delgado, Isabel Gallego, Xavier Perramon. 486-496 [doi]
- Design of the Decision Support System for Network Security Management to Secure Enterprise NetworkJae-Seung Lee, Sang-Choon Kim. 497-511 [doi]
- Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior AnalysisJia Wang, Insup Lee. 512-535 [doi]
- Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSDKenji Masui, Masahiko Tomoishi, Naoki Yonezaki. 536-553 [doi]