Abstract is missing.
- Security Weakness in Ren et al. s Group Key Agreement Scheme Built on Secure Two-Party ProtocolsJunghyun Nam, Seungjoo Kim, Dongho Won. 1-9 [doi]
- Cryptanalysis of Some Group-Oriented Proxy Signature SchemesJe Hong Park, Bo Gyeong Kang, Sangwoo Park. 10-24 [doi]
- Application of LFSRs in Time/Memory Trade-Off CryptanalysisSourav Mukhopadhyay, Palash Sarkar. 25-37 [doi]
- An Alert Data Mining Framework for Network-Based Intrusion Detection SystemMoon Sun Shin, Kyeong Ja Jeong. 38-53 [doi]
- Key Factors Influencing Worm Infection in Enterprise NetworksUrupoj Kanlayasiri, Surasak Sanguanpong. 54-67 [doi]
- Evaluation of the Unified Modeling Language for Security Requirements AnalysisMarife G. Ontua, Susan Pancho-Festin. 68-80 [doi]
- A Simple and Efficient Conference Scheme for Mobile CommunicationsWen-Shenq Juang. 81-95 [doi]
- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless NetworkKihun Hong, Souhwan Jung, Shyhtsun Felix Wu. 96-107 [doi]
- Efficient Multicast Stream Authentication for the Fully Adversarial Network ModelChristophe Tartary, Huaxiong Wang. 108-125 [doi]
- Elastic Security QoS Provisioning for Telematics ApplicationsMinsoo Lee, Sehyun Park, Ohyoung Song. 126-137 [doi]
- An Improved Algorithm to Watermark Numeric Relational DataFei Guo, Jianmin Wang, Zhihao Zhang, Xiaojun Ye, Deyi Li. 138-149 [doi]
- Video Fingerprinting System Using Wavelet and Error Correcting CodeHyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Hyejoo Lee, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi. 150-164 [doi]
- Secure Asymmetric Watermark Detection Without Secret of Modified PixelsMitsuo Okada, Hiroaki Kikuchi. 165-178 [doi]
- Kimchi: A Binary Rewriting Defense Against Format String AttacksJin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang-Jun Lee, Byung Ki Kim. 179-193 [doi]
- Software Protection Through Dynamic Code MutationMatias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere. 194-206 [doi]
- Efficient Hardware Implementation of Elliptic Curve Cryptography over ::::GF::::(::::p:::::::::::m:::::::)Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim. 207-217 [doi]
- Developing and Implementing IHPM on IXP 425 Network Processor PlatformsBo-Chao Cheng, Ching-Fu Huang, Wei-Chi Chang, Cheng-Shong Wu. 218-231 [doi]
- Analysis on the Clockwise Transposition Routing for Dedicated Factoring DevicesTetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama. 232-242 [doi]
- mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and SensorsChae Hoon Lim, Tymur Korkishko. 243-258 [doi]
- Practical Modifications of Leadbitter et al. s Repeated-Bits Side-Channel Analysis on (EC)DSAKatsuyuki Takashima. 259-270 [doi]
- A DPA Countermeasure by Randomized Frobenius DecompositionTae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung. 271-282 [doi]
- DPA Attack on the Improved Ha-Moon AlgorithmJong Hoon Shin, Dong Jin Park, Pil Joong Lee. 283-291 [doi]
- An Efficient Masking Scheme for AES Software ImplementationsElisabeth Oswald, Kai Schramm. 292-305 [doi]
- Secure Multi-attribute Procurement AuctionKoutarou Suzuki, Makoto Yokoo. 306-317 [doi]
- Oblivious Conjunctive Keyword SearchHyun Sook Rhee, Jin Wook Byun, Dong-Hoon Lee, Jongin Lim. 318-327 [doi]
- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal EncryptionGo Yamamoto, Koji Chida, Anderson C. A. Nascimento, Koutarou Suzuki, Shigenori Uchiyama. 328-342 [doi]
- New Concept of Authority Range for Flexible Management of Role HierarchySejong Oh. 343-353 [doi]
- Role-Based Access Control Model for Ubiquitous Computing EnvironmentSong-hwa Chae, Wonil Kim, Dong Kyoo Kim. 354-363 [doi]
- Designing Security Auditing Protocol with Web BrowsersHo Lee, Jung Song. 364-376 [doi]