Abstract is missing.
- Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication ProtocolJean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson. 1-25 [doi]
- The SPEKE Protocol RevisitedFeng Hao, Siamak Fayyaz Shahandashti. 26-38 [doi]
- Analyzing Proposals for Improving Authentication on the TLS/SSL-Protected WebChristopher W. Brown, Michael Jenkins. 39-56 [doi]
- Standardization Transparency - An Out of Body ExperiencePhillip H. Griffin. 57-68 [doi]
- Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long HashcodeJinwoo Lee, Pil Joong Lee. 69-78 [doi]
- Blinded Diffie-Hellman - Preventing Eavesdroppers from Tracking PaymentsDuncan Garrett, Michael Ward. 79-92 [doi]
- Security Goals and Evolving StandardsJoshua D. Guttman, Moses D. Liskov, Paul D. Rowe. 93-110 [doi]
- Analysis of the IBM CCA Security API Protocols in Maude-NPAAntonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer. 111-130 [doi]
- Robustness Modelling and Verification of a Mix Net ProtocolEfstathios Stathakidis, Steve A. Schneider, James Heather. 131-150 [doi]
- Stego Quality Enhancement by Message Size Reduction and Fibonacci Bit-Plane MappingAlan Anwer Abdulla, Harin Sellahewa, Sabah A. Jassim. 151-166 [doi]
- Secure Modular Password Authentication for the Web Using Channel BindingsMark Manulis, Douglas Stebila, Nick Denham. 167-189 [doi]
- A Modular Framework for Multi-Factor Authentication and Key ExchangeNils Fleischhacker, Mark Manulis, Amir Azodi. 190-214 [doi]
- Improving the ISO/IEC 11770 Standard for Key Management TechniquesCas Cremers, Marko Horvat. 215-235 [doi]
- Computationally Analyzing the ISO 9798-2.4 Authentication ProtocolBritta Hale, Colin Boyd. 236-255 [doi]