Abstract is missing.
- A New Approach to ::::chi:::::::2::: Cryptanalysis of Block CiphersJorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel. 1-16 [doi]
- Analysis and Optimization of Cryptographically Generated AddressesJoppe W. Bos, Onur Özen, Jean-Pierre Hubaux. 17-32 [doi]
- Security Analysis of the PACE Key-Agreement ProtocolJens Bender, Marc Fischlin, Dennis Kügler. 33-48 [doi]
- Towards Security Notions for White-Box CryptographyAmitabh Saxena, Brecht Wyseur, Bart Preneel. 49-58 [doi]
- A Calculus to Detect Guessing AttacksBogdan Groza, Marius Minea. 59-67 [doi]
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-nMario Lamberger, Florian Mendel. 68-78 [doi]
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVALYu Sasaki. 79-94 [doi]
- On Free-Start Collisions and Collisions for TIB3Florian Mendel, Martin Schläffer. 95-106 [doi]
- Detection of Database Intrusion Using a Two-Stage Fuzzy SystemSuvasini Panigrahi, Shamik Sural. 107-120 [doi]
- Combining Consistency and Confidentiality Requirements in First-Order DatabasesJoachim Biskup, Lena Wiese. 121-134 [doi]
- Cancelable Iris Biometrics Using Block Re-mapping and Image WarpingJutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl. 135-142 [doi]
- Iris Recognition in Nonideal SituationsKaushik Roy 0002, Prabir Bhattacharya. 143-150 [doi]
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext SecurityJian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao. 151-166 [doi]
- Practical Algebraic Attacks on the Hitag2 Stream CipherNicolas Courtois, Sean O Neil, Jean-Jacques Quisquater. 167-176 [doi]
- A New Construction of Boolean Functions with Maximum Algebraic ImmunityDeshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li. 177-185 [doi]
- A:::2:::M: Access-Assured Mobile Desktop ComputingAngelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh. 186-201 [doi]
- Automated Spyware Collection and AnalysisAndreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda. 202-217 [doi]
- Towards Unifying Vulnerability Information for Attack Graph ConstructionSebastian Roschke, Feng Cheng 0002, Robert Schuppenies, Christoph Meinel. 218-233 [doi]
- Traitor Tracing without A Priori Bound on the Coalition SizeHongxia Jin, Serdar Pehlivanoglu. 234-241 [doi]
- SISR - A New Model for Epidemic Spreading of Electronic ThreatsBoris Rozenberg, Ehud Gudes, Yuval Elovici. 242-249 [doi]
- An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory RequirementGildas Avoine, Aslan Tchamkerten. 250-261 [doi]
- Robust Authentication Using Physically Unclonable FunctionsKeith B. Frikken, Marina Blanton, Mikhail J. Atallah. 262-277 [doi]
- Risks of the CardSpace ProtocolSebastian Gajek, Jörg Schwenk, Michael Steiner, Chen Xuan. 278-293 [doi]
- Fair E-Cash: Be Compact, Spend FasterSébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré, Damien Vergnaud. 294-309 [doi]
- On the Security of Identity Based Ring Signcryption SchemesS. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan. 310-325 [doi]
- A Storage Efficient Redactable Signature in the Standard ModelRyo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi. 326-337 [doi]
- Generic Construction of Stateful Identity Based EncryptionPeng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai. 338-346 [doi]
- Privacy-Aware Attribute-Based Encryption with User AccountabilityJin Li, Kui Ren, Bo Zhu, Zhiguo Wan. 347-362 [doi]
- Hardware-Assisted Application-Level Access ControlYu-Yuan Chen, Ruby B. Lee. 363-378 [doi]
- Towards Trustworthy Delegation in Role-Based Access Control ModelManachai Toahchoodee, Xing Xie, Indrakshi Ray. 379-394 [doi]
- Secure Interoperation in Multidomain Environments Employing UCON PoliciesJianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma. 395-402 [doi]
- Specification and Enforcement of Static Separation-of-Duty Policies in Usage ControlJianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, Xiaopu Ma. 403-410 [doi]
- Nonce Generators and the Nonce Reset ProblemErik Zenner. 411-426 [doi]
- MAC Precomputation with Applications to Secure MemoryJuan A. Garay, Vladimir Kolesnikov, Rae McLellan. 427-442 [doi]
- HMAC without the Second KeyKan Yasuda. 443-458 [doi]
- Adding Trust to P2P Distribution of Paid ContentAlex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein. 459-474 [doi]
- Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large ScaleMirco Marchetti, Michele Messori, Michele Colajanni. 475-490 [doi]
- F3ildCrypt: End-to-End Protection of Sensitive Information in Web ServicesMatthew Burnside, Angelos D. Keromytis. 491-506 [doi]