Abstract is missing.
- Authenticated Key Exchange over BitcoinPatrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao. 3-20 [doi]
- Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC PaymentMaryam Mehrnezhad, Feng Hao, Siamak Fayyaz Shahandashti. 21-39 [doi]
- Robust Authenticated Key Exchange Using Passwords and Identity-Based SignaturesJung Yeon Hwang, Seung-Hyun Kim, Daeseon Choi, Seung Hun Jin, Boyeon Song. 43-69 [doi]
- Non-repudiation Services for the MMS Protocol of IEC 61850Karl Christoph Ruland, Jochen Sassmannshausen. 70-85 [doi]
- Analysis of the PKCS#11 API Using the Maude-NPA ToolAntonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer. 86-106 [doi]
- How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.toDaniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal. 109-139 [doi]
- Security of the SM2 Signature Scheme Against Generalized Key Substitution AttacksZhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen. 140-153 [doi]
- Side Channel Cryptanalysis of StreebogGautham Sekar. 154-162 [doi]
- Improving Air Interface User Privacy in Mobile TelephonyMohammed Shafiul Alam Khan, Chris J. Mitchell. 165-184 [doi]
- Generating Unlinkable IPv6 AddressesMwawi Nyirenda Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li, Chris J. Mitchell, Po-Wah Yau. 185-199 [doi]
- A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related RisksMasatoshi Hokino, Yuri Fujiki, Sakura Onda, Takeaki Kaneko, Natsuhiko Sakimura, Hiroyuki Sato. 203-217 [doi]
- First Results of a Formal Analysis of the Network Time Security SpecificationKristof Teichel, Dieter Sibold, Stefan Milius. 218-245 [doi]
- Formal Support for Standardizing Protocols with StateJoshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe. 246-265 [doi]