Abstract is missing.
- Replacement Attacks on Behavior Based Software BirthmarkZhi-Xin, Huiyu Chen, Xinche Wang, Peng Liu 0005, Sencun Zhu, Bing Mao, Li Xie. 1-16 [doi]
- Attacking Traitor Tracing Schemes Using History Recording and Abrupt DecodersAggelos Kiayias, Serdar Pehlivanoglu. 17-31 [doi]
- How to Find Short RC4 Colliding Key PairsJiageng Chen, Atsuko Miyaji. 32-46 [doi]
- A Formal Approach to Distance-Bounding RFID ProtocolsUlrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete. 47-62 [doi]
- MASHA - Low Cost Authentication with a New Stream CipherShinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima. 63-78 [doi]
- Toward Pairing-Free Certificateless Authenticated Key ExchangesHu Xiong, Qianhong Wu, Zhong Chen. 79-94 [doi]
- Security Analysis of an RSA Key Generation Algorithm with a Large Private KeyFanyu Kong, Jia Yu, Lei Wu. 95-101 [doi]
- Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release EncryptionKeita Emura, Atsuko Miyaji, Kazumasa Omote. 102-118 [doi]
- The n-Diffie-Hellman Problem and Its ApplicationsLiqun Chen, Yu Chen. 119-134 [doi]
- RatBot: Anti-enumeration Peer-to-Peer BotnetsGuanhua Yan, Songqing Chen, Stephan Eidenbenz. 135-151 [doi]
- Detecting Near-Duplicate SPITs in Voice Mailboxes Using HashesGe Zhang, Simone Fischer-Hübner. 152-167 [doi]
- Multi-stage Binary Code Obfuscation Using Improved Virtual MachineHui Fang, Yongdong Wu, Shuhong Wang, Yin Huang. 168-181 [doi]
- Detection and Analysis of Cryptographic Data Inside SoftwareRuoxu Zhao, Dawu Gu, Juanru Li, Ran Yu. 182-196 [doi]
- SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on PlatformsGeorgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos. 197-212 [doi]
- Hello rootKitty: A Lightweight Invariance-Enforcing FrameworkFrancesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen. 213-228 [doi]
- Opacity Analysis in Trust Management SystemsMoritz Y. Becker, Masoud Koleini. 229-245 [doi]
- On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality ConstraintsJoachim Biskup, Marcel Preuß, Lena Wiese. 246-261 [doi]
- Round-Efficient Oblivious Database ManipulationSven Laur, Jan Willemson, Bingsheng Zhang. 262-277 [doi]
- A Privacy-Preserving Join on Outsourced DatabaseSha Ma, Bo Yang, Kangshun Li, Feng Xia. 278-292 [doi]
- APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc NetworksLei Zhang 0009, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer. 293-308 [doi]
- Assessing Location Privacy in Mobile Communication NetworksKlaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle, Dirk von Suchodoletz. 309-324 [doi]
- How Much Is Enough? Choosing ε for Differential PrivacyJaewoo Lee, Chris Clifton. 325-340 [doi]
- Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter SecurityYuan Zhou, Haifeng Qian, Xiangxue Li. 341-354 [doi]
- An Efficient Construction of Time-Selective Convertible Undeniable SignaturesQiong Huang, Duncan S. Wong, Willy Susilo, Bo Yang 0003. 355-371 [doi]
- Efficient Fail-Stop Signatures from the Factoring AssumptionAtefeh Mashatan, Khaled Ouafi. 372-385 [doi]