Abstract is missing.
- Practical Authenticated Key Agreement Using PasswordsTaekyoung Kwon. 1-12 [doi]
- Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless NetworksMuxiang Zhang. 13-24 [doi]
- Storage-Efficient Stateless Group Key RevocationPan Wang, Peng Ning, Douglas S. Reeves. 25-38 [doi]
- Low-Level Ideal Signatures and General Integrity IdealizationMichael Backes, Birgit Pfitzmann, Michael Waidner. 39-51 [doi]
- Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSAJulien Cathalo, Benoît Libert, Jean-Jacques Quisquater. 52-60 [doi]
- How to Break and Repair a Universally Composable Signature FunctionalityMichael Backes, Dennis Hofheinz. 61-72 [doi]
- RSA Accumulator Based Broadcast EncryptionCraig Gentry, Zulfikar Ramzan. 73-86 [doi]
- Chameleon Hashing Without Key ExposureXiaofeng Chen, Fangguo Zhang, Kwangjo Kim. 87-98 [doi]
- Radix-r Non-Adjacent FormTsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu. 99-110 [doi]
- On Related-Key and Collision Attacks: The Case for the IBM 4758 CryptoprocessorRaphael Chung-Wei Phan, Helena Handschuh. 111-122 [doi]
- Security Analysis of Two Signcryption SchemesGuilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon. 123-133 [doi]
- On The Security of Key Derivation FunctionsCarlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato. 134-145 [doi]
- Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack RecoveryHai Wang, Peng Liu, Lunqun Li. 146-157 [doi]
- A Model for the Semantics of Attack Signatures in Misuse Detection SystemsMichael Meier. 158-169 [doi]
- Detection of Sniffers in an Ethernet NetworkZouheir Trabelsi, Hamza Rahmani. 170-182 [doi]
- Using Greedy Hamiltonian Call Paths to Detect Stack Smashing AttacksMark Foster, Joseph N. Wilson, Shigang Chen. 183-194 [doi]
- Securing DBMS: Characterizing and Detecting Query FloodsElisa Bertino, Teodoro Leggieri, Evimaria Terzi. 195-206 [doi]
- An XML-Based Approach to Document Flow VerificationElisa Bertino, Elena Ferrari, Giovanni Mella. 207-218 [doi]
- Model-Checking Access Control PoliciesDimitar P. Guelev, Mark Ryan, Pierre Yves Schobbens. 219-230 [doi]
- A Distributed High Assurance Reference MonitorAjay Chander, Drew Dean, John C. Mitchell. 231-244 [doi]
- Using Mediated Identity-Based Cryptography to Support Role-Based Access ControlDeholo Nali, Carlisle M. Adams, Ali Miri. 245-256 [doi]
- Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security)Richard Bergmair, Stefan Katzenbeisser. 257-267 [doi]
- Image Recognition CAPTCHAsMonica Chew, J. D. Tygar. 268-279 [doi]
- A Hierarchical Key-Insulated Signature Scheme in the CA Trust ModelZhengyi Le, Yi Ouyang, James Ford, Fillia Makedon. 280-291 [doi]
- Certificate Recommendations to Improve the Robustness of Web of TrustQinglin Jiang, Douglas S. Reeves, Peng Ning. 292-303 [doi]
- Universally Composable Secure Mobile Agent ComputationKe Xu, Stephen R. Tate. 304-317 [doi]
- Re-thinking Security in IP Based Micro-MobilityJukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen. 318-329 [doi]
- Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc GroupQianhong Wu, Xiaofeng Chen, Changjie Wang, YuMin Wang. 330-341 [doi]
- Prevent Online Identity Theft - Using Network Smart Cards for Secure Online TransactionsHongQian Karen Lu, Asad Ali. 342-353 [doi]
- Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps!Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski. 354-366 [doi]
- An Efficient Online Electronic Cash with Unlinkable Exact PaymentsToru Nakanishi, Mitsuaki Shiota, Yuji Sugiyama. 367-378 [doi]
- Modifiable Digital Content Protection in P2PHeejae Park, Jong Kim. 379-390 [doi]
- Survey on the Technological Aspects of Digital Rights ManagementWilliam Ku, Chi-Hung Chi. 391-403 [doi]
- Detecting Software Theft via Whole Program Path BirthmarksGinger Myles, Christian S. Collberg. 404-415 [doi]
- Effective Security Requirements Analysis: HAZOP and Use CasesThitima Srivatanakul, John A. Clark, Fiona A. C. Polack. 416-427 [doi]
- The Obfuscation ExecutiveKelly Heffner, Christian S. Collberg. 428-440 [doi]