Abstract is missing.
- Detecting System EmulatorsThomas Raffetseder, Christopher Krügel, Engin Kirda. 1-18 [doi]
- Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection SystemsIosif-Viorel Onut, Ali A. Ghorbani. 19-36 [doi]
- E-NIPS: An Event-Based Network Intrusion Prediction SystemPradeep Kannadiga, Mohammad Zulkernine, Anwar Haque. 37-52 [doi]
- Enabling Fairer Digital Rights Management with Trusted ComputingAhmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg. 53-70 [doi]
- Traitor Tracing with Optimal Transmission RateNelly Fazio, Antonio Nicolosi, Duong Hieu Phan. 71-88 [doi]
- The Security of Elastic Block Ciphers Against Key-Recovery AttacksDebra L. Cook, Moti Yung, Angelos D. Keromytis. 89-103 [doi]
- Impossible-Differential Attacks on Large-Block RijndaelJorge Nakahara Jr., Ivan Carlos Pavão. 104-117 [doi]
- High-Speed Pipelined Hardware Architecture for Galois Counter ModeAkashi Satoh, Takeshi Sugawara, Takafumi Aoki. 118-129 [doi]
- Efficient Committed Oblivious Transfer of Bit StringsMehmet S. Kiraz, Berry Schoenmakers, José Villegas. 130-144 [doi]
- An Efficient Certified Email ProtocolJun Shao, Min Feng, Bin Zhu, Zhenfu Cao. 145-157 [doi]
- Revisiting the Security Model for Timed-Release Encryption with Pre-open CapabilityAlexander W. Dent, Qiang Tang. 158-174 [doi]
- On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated SignaturesFabien Laguillaumie, Damien Vergnaud. 175-188 [doi]
- Identity-Based Proxy Re-encryption Without Random OraclesCheng-Kang Chu, Wen-Guey Tzeng. 189-202 [doi]
- Strongly-Secure Identity-Based Key Agreement and Anonymous ExtensionSherman S. M. Chow, Kim-Kwang Raymond Choo. 203-220 [doi]
- Small Private-Exponent Attack on RSA with Primes Sharing BitsYao-Dong Zhao, Wen-Feng Qi. 221-229 [doi]
- Multiple Modular Additions and Crossword Puzzle Attack on NLSv2Joo Yeon Cho, Josef Pieprzyk. 230-248 [doi]
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and PyGautham Sekar, Souradyuti Paul, Bart Preneel. 249-262 [doi]
- Queue Management as a DoS Counter-Measure?Daniel Boteanu, José M. Fernandez, John McHugh, John Mullins. 263-280 [doi]
- On the Concept of Software Obfuscation in Computer SecurityNikolay Kuzurin, Alexander Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov. 281-298 [doi]
- Specifying Imperative Data ObfuscationsStephen Drape, Clark D. Thomborson, Anirban Majumdar. 299-314 [doi]
- Token-Controlled Public Key Encryption in the Standard ModelSherman S. M. Chow. 315-332 [doi]
- Trapdoor Permutation Polynomials of Z/ ::::n:::: Z and Public Key CryptosystemsGuilhem Castagnos, Damien Vergnaud. 333-350 [doi]
- A Generalization and a Variant of Two Threshold Cryptosystems Based on FactoringYvo Desmedt, Kaoru Kurosawa. 351-361 [doi]
- Towards a DL-Based Additively Homomorphic Encryption SchemeGuilhem Castagnos, Benoît Chevallier-Mames. 362-375 [doi]
- Differential Properties of Elliptic Curves and Blind SignaturesBilly Bob Brumley, Kaisa Nyberg. 376-389 [doi]
- Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number RepresentationPradeep Kumar Mishra, Vassil S. Dimitrov. 390-406 [doi]
- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access ControlJoachim Biskup, Jan-Hendrik Lochner. 407-422 [doi]
- Efficient Negative Databases from Cryptographic Hash FunctionsGeorge Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel. 423-436 [doi]