Abstract is missing.
- A Brief History of Security Models for ConfidentialityAlexander W. Dent. 1 [doi]
- Symbolic Methods for Provable SecurityBogdan Warinschi. 2 [doi]
- Efficient Non-interactive Universally Composable String-Commitment SchemesRyo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka. 3-18 [doi]
- Spatial Encryption under Simpler AssumptionMuxin Zhou, Zhenfu Cao. 19-31 [doi]
- Chosen-Ciphertext Secure RSA-Type CryptosystemsBenoît Chevallier-Mames, Marc Joye. 32-46 [doi]
- Anonymous Conditional Proxy Re-encryption without Random OracleLiming Fang, Willy Susilo, Jiandong Wang. 47-60 [doi]
- Breaking and Fixing of an Identity Based Multi-Signcryption SchemeS. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan. 61-75 [doi]
- Identity-Based Verifiably Encrypted Signatures without Random OraclesLei Zhang, Qianhong Wu, Bo Qin. 76-89 [doi]
- How to Prove Security of a Signature with a Tighter Security ReductionFuchun Guo, Yi Mu, Willy Susilo. 90-103 [doi]
- Twin Signature Schemes, RevisitedSven Schäge. 104-117 [doi]
- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash FunctionsEiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka. 118-128 [doi]
- Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?Man Ho Au, Willy Susilo, Yi Mu. 129-139 [doi]
- Anonymous Signatures RevisitedVishal Saraswat, Aaram Yun. 140-153 [doi]
- An eCK-Secure Authenticated Key Exchange Protocol without Random OraclesDaisuke Moriyama, Tatsuaki Okamoto. 154-167 [doi]
- Password Authenticated Key Exchange Based on RSA in the Three-Party SettingsE. Dongna, Qingfeng Cheng, Chuangui Ma. 168-182 [doi]
- Comparing ::::SessionStateReveal:::: and ::::EphemeralKeyReveal:::: for Diffie-Hellman ProtocolsBerkant Ustaoglu. 183-197 [doi]
- Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext KnowledgeKeita Xagawa, Keisuke Tanaka. 198-213 [doi]
- Server-Controlled Identity-Based Authenticated Key ExchangeHua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li. 214-229 [doi]
- Oracle Separation in the Non-uniform ModelAhto Buldas, Sven Laur, Margus Niitsoo. 230-244 [doi]
- GUC-Secure Set-Intersection ComputationYuan Tian, Hao Zhang. 245-259 [doi]
- Self-enforcing Private Inference ControlYanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao. 260-274 [doi]