Abstract is missing.
- Extending .NET Security to Unmanaged CodePatrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna. 1-16 [doi]
- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible ValidationZhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie. 17-31 [doi]
- Low Latency Anonymity with Mix RingsMatthew Burnside, Angelos D. Keromytis. 32-45 [doi]
- Breaking Four Mix-Related Schemes Based on Universal Re-encryptionGeorge Danezis. 46-59 [doi]
- Weak ::::k::::-Anonymity: A Low-Distortion Model for Protecting PrivacyMaurizio Atzori. 60-71 [doi]
- Protecting Data Privacy Through Hard-to-Reverse Negative DatabasesFernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest. 72-84 [doi]
- Related-Key Rectangle Attack on 42-Round SHACAL-2Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman. 85-100 [doi]
- On the Collision Resistance of RIPEMD-160Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen. 101-116 [doi]
- Blind Ring Signatures Secure Under the Chosen-Target-CDH AssumptionJavier Herranz, Fabien Laguillaumie. 117-130 [doi]
- Multi-party Concurrent SignaturesDongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini. 131-145 [doi]
- Formal Security Model of MultisignaturesYuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura. 146-160 [doi]
- Cryptanalysis of Variants of UOVYuh-Hua Hu, Chun-yen Chou, Lih-Chung Wang, Feipei Lai. 161-170 [doi]
- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design PrinciplesChristophe De Cannière. 171-186 [doi]
- Cryptanalysis of the Bluetooth ::::E::::::::::0:::::: Cipher Using OBDD sYaniv Shaked, Avishai Wool. 187-202 [doi]
- A Partial Key Exposure Attack on RSA Using a 2-Dimensional LatticeEllen Jochemsz, Benne de Weger. 203-216 [doi]
- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword SearchJoonsang Baek, Reihaneh Safavi-Naini, Willy Susilo. 217-232 [doi]
- Collusion-Free Policy-Based EncryptionWalid Bagga, Refik Molva. 233-245 [doi]
- Using Multiple Smart Cards for Signing Messages at Malicious TerminalsIstván Zsolt Berta. 246-256 [doi]
- Diverging Keys in Wireless Sensor NetworksMichal Ren, Tanmoy Kanti Das, Jianying Zhou. 257-269 [doi]
- A Generic Transformation from Symmetric to Asymmetric Broadcast EncryptionUlrich Huber, Ahmad-Reza Sadeghi. 270-285 [doi]
- Transparent Image Encryption Using Progressive JPEGThomas Stütz, Andreas Uhl. 286-298 [doi]
- Preserving TCP Connections Across Host Address ChangesVassilis Prevelakis, Sotiris Ioannidis. 299-310 [doi]
- A Security Architecture for Protecting LAN InteractionsAndré Zúquete, Hugo Marques. 311-326 [doi]
- Simulation of Internet DDoS Attacks and DefenseIgor V. Kotenko, Alexander Ulanov. 327-342 [doi]
- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZErGreg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna. 343-358 [doi]
- Rights Protection for Data CubesJie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen. 359-372 [doi]
- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM)Huifang Yin, Jun Li. 373-382 [doi]
- Resistance Analysis to Intruders Evasion of Detecting IntrusionJianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang. 383-397 [doi]
- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc NetworksLuciano Bononi, Carlo Tacconi. 398-414 [doi]
- Anomaly Intrusion Detection Based on Clustering a Data StreamSang Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won Suk Lee. 415-426 [doi]
- Robust Reactions to Potential Day-Zero Worms Through Cooperation and ValidationKostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald. 427-442 [doi]
- An Authentication and Key Exchange Protocol for Secure Credential ServicesSeongHan Shin, Kazukuni Kobara, Hideki Imai. 443-458 [doi]
- A Non-malleable Group Key Exchange Protocol Robust Against Active InsidersYvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang. 459-475 [doi]
- Formalising Receipt-FreenessHugo L. Jonker, Erik P. de Vink. 476-488 [doi]
- Enhancing the Security and Efficiency of 3-D SecureMohammed Assora, Ayoub Shirvani. 489-501 [doi]
- Designing and Verifying Core Protocols for Location PrivacyDavid von Oheimb, Jorge Cuéllar. 502-516 [doi]
- Delegation in a Distributed Healthcare Context: A Survey of Current ApproachesMila Katzarova, Andrew Simpson. 517-529 [doi]
- Managing Information Systems Security: Critical Success Factors and Indicators to Measure EffectivenessJosé Manuel Torres, Jose Maria Sarriegi, Javier Santos, Nicolás Serrano. 530-545 [doi]