Abstract is missing.
- Protecting IPTV Service Network against Malicious Rendezvous PointHyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo. 1-9 [doi]
- Design and Implementation of SIP-aware Security Management SystemKyounghee Ko, Hwan Kuk Kim, Jeongwook Kim, Chang-Yong Lee, Soo-Gil Cha, Hyun-Cheol Jeong. 10-19 [doi]
- Application Management Framework in User Centric Smart Card Ownership ModelRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 20-35 [doi]
- When Compromised Readers Meet RFIDGildas Avoine, Cédric Lauradoux, Tania Martin. 36-50 [doi]
- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?Marcel Medwed, Jörn-Marc Schmidt. 51-65 [doi]
- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic ModulesTakeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Akashi Satoh. 66-78 [doi]
- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost EquipmentTimo Kasper, David Oswald, Christof Paar. 79-93 [doi]
- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random OraclesPairat Thorncharoensri, Willy Susilo, Yi Mu. 94-108 [doi]
- Construction of Odd-Variable Boolean Function with Maximum Algebraic ImmunityShaojing Fu, Longjiang Qu, Chao Li. 109-117 [doi]
- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK PrivacyKun Peng, Feng Bao. 118-132 [doi]
- ID-Based Adaptive Oblivious TransferFangguo Zhang, Xingwen Zhao, Xiaofeng Chen. 133-147 [doi]
- Unknown Plaintext Template AttacksNeil Hanley, Michael Tunstall, William P. Marnane. 148-162 [doi]
- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID DevicesThomas Plos, Michael Hutter, Martin Feldhofer. 163-177 [doi]
- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure ::::S::::-Box ImplementationJ. Pan, J. I. den Hartog, Jiqiang Lu. 178-192 [doi]
- A Comparative Study of Mutual Information Analysis under a Gaussian AssumptionAmir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh. 193-205 [doi]
- Finding Collisions for a 45-Step Simplified HAS-VNicky Mouha, Christophe De Cannière, Sebastiaan Indesteege, Bart Preneel. 206-225 [doi]
- Non-linear Error Detection for Finite State MachinesKahraman D. Akdemir, Ghaith Hammouri, Berk Sunar. 226-238 [doi]
- Quadratic Equations from a Kind of S-boxesJia Xie, Weiwei Cao, TianZe Wang. 239-253 [doi]
- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation StructureWeiwei Cao, Lei Hu. 254-267 [doi]
- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANETRasheed Hussain, Sangjin Kim, Heekuck Oh. 268-280 [doi]
- A Selectable ::::k::::-Times Relaxed Anonymous Authentication SchemeKeita Emura, Atsuko Miyaji, Kazumasa Omote. 281-295 [doi]
- PUF-Based Authentication Protocols - RevisitedHeike Busch, Stefan Katzenbeisser, Paul Baecher. 296-308 [doi]
- Mediated Ciphertext-Policy Attribute-Based Encryption and Its ApplicationLuan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter H. Hartel, Willem Jonker. 309-323 [doi]
- Securing Remote Access Inside Wireless Mesh NetworksMark Manulis. 324-338 [doi]
- Detecting Ringing-Based DoS Attacks on VoIP Proxy ServersDae Hyun Yum, Sun Young Kim, HoKun Moon, Mi-Yeon Kim, Jae-Hoon Roh, Pil Joong Lee. 339-353 [doi]
- USN Middleware Security ModelMijoo Kim, Mi Yeon Yoon, Hyun-Cheol Jeong, Heung-Youl Youm. 354-365 [doi]
- Practical Broadcast Authentication Using Short-Lived Signatures in WSNsChae Hoon Lim. 366-383 [doi]