Abstract is missing.
- Circular Security ReconsideredF. Betül Durak, Serge Vaudenay. 3-19 [doi]
- Visual Cryptography - Models, Issues, Applications and New DirectionsPaolo D'Arco, Roberto De Prisco. 20-39 [doi]
- Paper Tigers: An Endless FightMozhdeh Farhadi, Jean-Louis Lanet. 40-62 [doi]
- Security of Identity-Based Encryption Schemes from Quadratic ResiduesFerucio Laurentiu Tiplea, Sorin Iftene, George Teseleanu, Anca-Maria Nica. 63-77 [doi]
- Long-Term Secure One-Round Group Key Establishment from Multilinear MappingsKashi Neupane. 81-91 [doi]
- RSA Weak Public Keys Available on the InternetMihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion. 92-102 [doi]
- A Tweak for a PRF Mode of a Compression Function and Its ApplicationsShoichi Hirose, Atsushi Yabumoto. 103-114 [doi]
- q and Its Application to Information Set DecodingShoichi Hirose. 115-126 [doi]
- A Cryptographic Approach for Implementing Semantic Web's Trust LayerBogdan Iancu, Cristian Sandu. 127-136 [doi]
- Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral SecretLukasz Krzywiecki. 137-148 [doi]
- Homomorphic Encryption Based on Group Algebras and Goldwasser-Micali SchemeCezar Plesca, Mihai Togan, Cristian Lupascu. 149-166 [doi]
- Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its InitializationEstuardo Alpirez Bock, Zoya Dyka, Peter Langendörfer. 167-178 [doi]
- When Pythons BiteAlecsandru Patrascu, Stefan Popa. 181-192 [doi]
- Secure Virtual Machine for Real Time Forensic Tools on Commodity WorkstationsDan Lutas, Adrian Colesa, Sándor Lukács, Andrei Lutas. 193-208 [doi]
- Pushing the Optimization Limits of Ring Oscillator-Based True Random Number GeneratorsAndrei Marghescu, Paul Svasta. 209-224 [doi]
- TOR - Didactic Pluggable TransportIoana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion. 225-239 [doi]
- Preparation of SCA Attacks: Successfully Decapsulating BGA PackagesChristian Wittke, Zoya Dyka, Oliver Skibitzki, Peter Langendörfer. 240-247 [doi]
- Comparative Analysis of Security Operations Centre Architectures; Proposals and Architectural Considerations for Frameworks and Operating ModelsSabina Georgiana Radu. 248-260 [doi]
- Secure Transaction Authentication ProtocolPardis Pourghomi, Muhammad Qasim Saeed, Pierre E. Abi-Char. 261-273 [doi]
- Proposed Scheme for Data Confidentiality and Access Control in Cloud ComputingAna-Maria Ghimes, Victor Valeriu Patriciu. 274-285 [doi]