Abstract is missing.
- ID-Based Ring Signature Scheme Secure in the Standard ModelMan Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong. 1-16 [doi]
- A Short Verifier-Local Revocation Group Signature Scheme with Backward UnlinkabilityToru Nakanishi, Nobuo Funabiki. 17-32 [doi]
- Sound Computational Interpretation of Symbolic Hashes in the Standard ModelFlavio D. Garcia, Peter van Rossum. 33-47 [doi]
- A Requirement Centric Framework for Information Security EvaluationReijo Savola. 48-59 [doi]
- A Model-Based Method for Security Configuration VerificationHiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa. 60-75 [doi]
- Personal Computer Privacy: Analysis for Korean PC UsersYoung Chul Kwon, Sang-Won Lee, Songchun Moon. 76-87 [doi]
- Short Traceable Signatures Based on Bilinear PairingsSeung Geol Choi, Kunsoo Park, Moti Yung. 88-103 [doi]
- Ring Signature with Designated LinkabilityJoseph K. Liu, Willy Susilo, Duncan S. Wong. 104-119 [doi]
- Ad Hoc Group SignaturesQianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang. 120-135 [doi]
- Rateless Codes for the Multicast Stream Authentication ProblemChristophe Tartary, Huaxiong Wang. 136-151 [doi]
- Crossing Borders: Security and Privacy Issues of the European e-PassportJaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur. 152-167 [doi]
- A New Approach to Hide Policy for Automated Trust NegotiationHai Jin, Zhensong Liao, Deqing Zou, Weizhong Qiang. 168-178 [doi]
- Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted ComputingXinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu. 179-195 [doi]
- IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring SignaturesJames Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry. 196-211 [doi]
- A Study of Detection Method of Printed Image Alteration Using Digital WatermarkJunji Onishi, Tsukasa Ono. 212-226 [doi]
- Real-Time Watermark Embedding for High Resolution Video WatermarkingIn Koo Kang, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee. 227-238 [doi]
- Inhibiting Card Sharing AttacksMichael Tunstall, Constantinos Markantonakis, Keith Mayes. 239-251 [doi]
- A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and PredictionYi Shi, Xinyu Yang, Huijun Zhu. 252-267 [doi]
- Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite AttacksYongsu Park, YounHo Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim. 268-277 [doi]
- Modeling of Network Intrusions Based on the Multiple Transition ProbabilitySang-Kyun Noh, DongKook Kim, Yong-Min Kim, Bong-Nam Noh. 278-291 [doi]
- Chosen Ciphertext Security from Identity-Based Encryption Without ::::Strong:::: ConditionChik-How Tan. 292-307 [doi]
- Ciphertext-Auditable Public Key EncryptionSatoshi Hada, Kouichi Sakurai. 308-321 [doi]
- Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard ModelJeong Ok Kwon, Ik Rae Jeong, Dong-Hoon Lee. 322-336 [doi]
- On the Effectiveness of TMTO and Exhaustive Search AttacksSourav Mukhopadhyay, Palash Sarkar. 337-352 [doi]
- Low Power AES Hardware Architecture for Radio Frequency IdentificationMooseop Kim, Jaecheol Ryou, YongJe Choi, SungIk Jun. 353-363 [doi]
- The High-Speed Packet Cipher System Suitable for Small Sized DataSang-Hyun Park, Hoon Choi, Sang-Han Lee, Taejoo Chang. 364-377 [doi]
- A Tool for Managing Security Policies in OrganisationsAnna V. Álvarez, Karen A. García, Raul Monroy, Luis A. Trejo, Jesús Vázquez. 378-388 [doi]
- Information Flow Query and Verification for Security Policy of Security-Enhanced LinuxYi-Ming Chen, Yung-Wei Kao. 389-404 [doi]
- The Complexity of Discretionary Access ControlStephen Dranger, Robert H. Sloan, Jon A. Solworth. 405-420 [doi]
- Traceroute Based IP Channel for Sending Hidden Short MessagesZouheir Trabelsi, Hesham El-Sayed, Lilia Frikha, Tamer F. Rabie. 421-436 [doi]