Abstract is missing.
- A New Soft Decision Tracing Algorithm for Binary Fingerprinting CodesMinoru Kuribayashi. 1-15 [doi]
- REASSURE: A Self-contained Mechanism for Healing Software Using Rescue PointsGeorgios Portokalidis, Angelos D. Keromytis. 16-32 [doi]
- Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS TechniqueAtsushi Fujioka. 33-50 [doi]
- A Secure M + 1st Price Auction Protocol Based on Bit Slice CircuitsTakuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto. 51-64 [doi]
- Cryptographic Pairings Based on Elliptic NetsNaoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto. 65-78 [doi]
- Identity-Based Deterministic Signature Scheme without Forking-LemmaS. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan. 79-95 [doi]
- Nitro: Hardware-Based System Call Tracing for Virtual MachinesJonas Pfoh, Christian Schneider, Claudia Eckert. 96-112 [doi]
- Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint TrackingAngeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis. 113-128 [doi]
- An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based NetworksMaryam Shojaei, Naser Movahhedinia, Behrouz Tork Ladani. 129-143 [doi]
- A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom GeneratorsKoji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata. 144-160 [doi]
- A Theoretical Analysis of the Structure of HC-128Goutam Paul, Subhamoy Maitra, Shashwat Raizada. 161-177 [doi]
- Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack ComplexityYu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, Kazuo Ohta. 178-192 [doi]
- Towards Restricting Plaintext Space in Public Key EncryptionYusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote. 193-209 [doi]
- Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-EncryptionRyotaro Hayashi, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, Koji Okada. 210-229 [doi]