Abstract is missing.
- Security on LBlock against Biclique CryptanalysisYanfeng Wang, Wenling Wu, Xiaoli Yu, Lei Zhang 0012. 1-14 [doi]
- Improved Impossible Differential Attacks on Reduced-Round MISTY1Keting Jia, Leibo Li. 15-27 [doi]
- Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUsSatoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai. 28-42 [doi]
- Enumeration of Even-Variable Boolean Functions with Maximum Algebraic ImmunityWentao Zhao, Xin Hai, Shaojing Fu, Chao Li, Yanfeng Wang. 43-54 [doi]
- Multi-precision Multiplication for Public-Key Cryptography on Embedded MicroprocessorsHwajeong Seo, Howon Kim. 55-67 [doi]
- Three Phase Dynamic Current Mode Logic: A More Secure DyCML to Achieve a More Balanced Power ConsumptionHyunmin Kim, Vladimir Rozic, Ingrid Verbauwhede. 68-81 [doi]
- Improved Differential Fault Analysis on Block Cipher ARIAJeaHoon Park, JaeCheol Ha. 82-95 [doi]
- Multi-Level Controlled SignaturePairat Thorncharoensri, Willy Susilo, Yi Mu. 96-110 [doi]
- Tate Pairing Computation on Generalized Hessian CurvesLiangze Li, Fan Zhang. 111-123 [doi]
- Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle ModelMario Larangeira, Keisuke Tanaka. 124-143 [doi]
- An Authentication and Key Management Scheme for the Proxy Mobile IPv6Hyun-Sun Kang, Chang-Seop Park. 144-160 [doi]
- Payment Approval for PayWordLászló Aszalós, Andrea Huszti. 161-176 [doi]
- Anonymity-Based Authenticated Key Agreement with Full Binding PropertyJung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang. 177-191 [doi]
- A Study for Classification of Web Browser Log and Timeline VisualizationJunghoon Oh, Namheun Son, Sangjin Lee, Kyungho Lee. 192-207 [doi]
- Intellectual Property Protection for Integrated Systems Using Soft Physical Hash FunctionsFrançois Durvaux, Benoît Gérard, Stéphanie Kerckhof, François Koeune, François-Xavier Standaert. 208-225 [doi]
- N-Victims: An Approach to Determine N-Victims for APT InvestigationsShun-Te Liu, Yi-Ming Chen, Hui-ching Hung. 226-240 [doi]
- An Efficient Filtering Method for Detecting Malicous Web PagesJaeun Choi, Gisung Kim, Tae Ghyoon Kim, Sehun Kim. 241-253 [doi]
- Lightweight Client-Side Methods for Detecting Email ForgeryEric Lin, John Aycock, Mohammad Mannan. 254-269 [doi]
- AIGG Threshold Based HTTP GET Flooding Attack DetectionYangseo Choi, Ik-Kyun Kim, Jintae Oh, Jongsoo Jang. 270-284 [doi]
- Implementation of GESNIC for Web Server Protection against HTTP GET Flooding AttacksHyunjoo Kim, Byoung-Koo Kim, Daewon Kim, Ik-Kyun Kim, Tai-Myoung Chung. 285-295 [doi]
- Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into PracticeRasheed Hussain, Sangjin Kim, Heekuck Oh. 296-311 [doi]
- On Trigger Detection against Reactive Jamming Attacks: A Localized SolutionIncheol Shin, Sinkyu Kim, Jungtaek Seo. 312-327 [doi]
- Efficient Self-organized Trust Management in Location Privacy Enhanced VANETsYu-Chih Wei, Yi-Ming Chen. 328-344 [doi]
- A Trust Management Model for QoS-Based Service SelectionYukyong Kim, Kyung-Goo Doh. 345-357 [doi]
- Multilevel Secure Database on Security Enhanced Linux for System High Distributed SystemsHaklin Kimm, Norkee Sherpa. 358-370 [doi]