Abstract is missing.
- Revisiting Software ProtectionPaul C. van Oorschot. 1-13 [doi]
- Enabling Shared Audit DataAdrian Baldwin, Simon Shiu. 14-28 [doi]
- Cryptographically Generated Addresses (CGA)Tuomas Aura. 29-43 [doi]
- Validating and Securing Spontaneous Associations between Wireless DevicesTim Kindberg, Kan Zhang. 44-53 [doi]
- Single Sign-On Using Trusted PlatformsAndreas Pashalidis, Chris J. Mitchell. 54-68 [doi]
- Easy Verifiable Primitives and Practical Public Key CryptosystemsDavid Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar. 69-83 [doi]
- Reactively Secure Signature SchemesMichael Backes, Birgit Pfitzmann, Michael Waidner. 84-95 [doi]
- Validating Digital Signatures without TTP s Time-Stamping and Certificate RevocationJianying Zhou, Feng Bao, Robert H. Deng. 96-110 [doi]
- A Fast Signature Scheme Based on New On-line ComputationTakeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto. 111-121 [doi]
- Distributed RSA Signature Schemes for General Access StructuresJavier Herranz, Carles Padró, Germán Sáez. 122-136 [doi]
- Divisible Voting SchemeNatsuki Ishida, Shin ichiro Matsuo, Wakaha Ogata. 137-150 [doi]
- Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party ComputationsAnderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai. 151-164 [doi]
- The Design and Implementation of Protocol-Based Hidden Key RecoveryEu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle. 165-179 [doi]
- Intrinsic Limitations of Digital Signatures and How to Cope with ThemUeli M. Maurer. 180-192 [doi]
- On the Security of Fair Non-repudiation ProtocolsSigrid Gürgens, Carsten Rudolph, Holger Vogt. 193-207 [doi]
- Security Analysis of a Password Authenticated Key Exchange ProtocolFeng Bao. 208-217 [doi]
- Zero-Value Point Attacks on Elliptic Curve CryptosystemToru Akishita, Tsuyoshi Takagi. 218-233 [doi]
- Cryptanalysis of an Algebraic Privacy HomomorphismDavid Wagner. 234-239 [doi]
- Analysis of the Insecurity of ECMQV with Partially Known NoncesPeter J. Leadbitter, Nigel P. Smart. 240-251 [doi]
- Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DESAkashi Satoh, Sumio Morioka. 252-266 [doi]
- A Note on Weak Keys of PES, IDEA, and Some Extended VariantsJorge Nakahara Jr., Bart Preneel, Joos Vandewalle. 267-279 [doi]
- Foundations of Differential Cryptanalysis in Abelian GroupsTomasz Tyksinski. 280-294 [doi]
- Trust and Authorization in Pervasive B2E ScenariosLaurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta. 295-309 [doi]
- A Logic Model for Temporal Authorization Delegation with NegationChun Ruan, Vijay Varadharajan, Yan Zhang. 310-324 [doi]
- Zero-Distortion Authentication WatermarkingYongdong Wu. 325-337 [doi]
- Designated Verification of Non-invertible WatermarkHyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim. 338-351 [doi]
- Proactive Software Tampering DetectionHongxia Jin, Jeffery Lotspiech. 352-365 [doi]
- Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow ExploitsPramod Ramarao, Akhilesh Tyagi, Gyungho Lee. 366-380 [doi]
- Towards a Business Process-Driven Framework for Security Engineering with the UMLJosé Luis Vivas, José A. Montenegro, Javier Lopez. 381-395 [doi]
- Error Correcting and Complexity Aspects of Linear Secret Sharing SchemesYvo Desmedt, Kaoru Kurosawa, Tri Van Le. 396-407 [doi]
- Systematic Treatment of Collusion Secure Codes: Security Definitions and Their RelationsKatsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto. 408-421 [doi]
- Short c-Secure Fingerprinting CodesTri Van Le, Mike Burmester, Jiangyi Hu. 422-427 [doi]
- The Role of Arbiters in Asymmetric Authentication SchemesGoichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai. 428-441 [doi]