Abstract is missing.
- On Generating Elements of Orders Dividing p:::2k:::±p:::k:::+1Maciej Grzeskowiak. 1-19 [doi]
- Chosen Ciphertext Secure Public Key Encryption with a Simple StructureGoichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe. 20-33 [doi]
- Remarks on the Attack of Fouque et al. against the lIC SchemeNaoki Ogura, Shigenori Uchiyama. 34-48 [doi]
- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random OraclesFuchun Guo, Yi Mu, Zhide Chen. 49-63 [doi]
- Signcryption Scheme in Multi-user Setting without Random OraclesChik-How Tan. 64-82 [doi]
- Simple and Efficient Group Signature Scheme Assuming Tamperproof DevicesTakuya Yoshida, Koji Okada. 83-99 [doi]
- The Superdiversifier: Peephole Individualization for Software ProtectionMatthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, Ramarathnam Venkatesan. 100-120 [doi]
- Detecting Java Theft Based on Static API Trace BirthmarkHeewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han. 121-135 [doi]
- Online Network Forensics for Automatic Repair ValidationMichael E. Locasto, Matthew Burnside, Angelos D. Keromytis. 136-151 [doi]
- Return Value Predictability Profiles for Self-healingMichael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo. 152-166 [doi]
- Involuntary Information Leakage in Social Network ServicesIeng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen. 167-183 [doi]
- Privacy Preserving Computations without Public Key Cryptographic OperationKoji Chida, Katsumi Takahashi. 184-200 [doi]
- A Novel Framework for Watermarking: The Data-Abstracted ApproachCyril Bazin, Jean-Marie Le Bars, Jacques Madelaine. 201-217 [doi]
- The Elliptic Curve Discrete Logarithm Problem: State of the ArtAlfred Menezes. 218 [doi]
- An Application of the Boneh and Shacham Group Signature Scheme to Biometric AuthenticationJulien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer. 219-230 [doi]
- Analysis of a Biometric Authentication Protocol for Signature Creation ApplicationAnongporn Salaiwarakul, Mark Ryan. 231-245 [doi]
- Efficient Secure Labeling Method under Dynamic XML Data StreamsDong Chan An, So Mi Park, Seog Park. 246-260 [doi]
- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable SystemsYohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda. 261-278 [doi]
- The Long-Short-Key Primitive and Its Applications to Key SecurityMatthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan. 279-297 [doi]