Abstract is missing.
- Can Code Polymorphism Limit Information Leakage?Antoine Amarilli, Sascha Müller, David Naccache, Dan Page, Pablo Rauzy, Michael Tunstall. 1-21 [doi]
- Mobile Electronic Identity: Securing Payment on Mobile PhonesChen Bangdao, A. W. Roscoe. 22-37 [doi]
- Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid SystemsAntonios Gouglidis, Ioannis Mavridis. 38-53 [doi]
- SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped KeyChunhua Chen 0002, Chris J. Mitchell, Shaohua Tang. 54-68 [doi]
- An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag ControlPaolo D Arco. 69-84 [doi]
- Affiliation-Hiding Authentication with Minimal Bandwidth ConsumptionMark Manulis, Bertram Poettering. 85-99 [doi]
- Formal Framework for the Evaluation of Waveform Resynchronization AlgorithmsSylvain Guilley, Karim Khalfallah, Victor Lomné, Jean-Luc Danger. 100-115 [doi]
- Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate LibraryYumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda. 116-127 [doi]
- Information Leakage Discovery Techniques to Enhance Secure Chip DesignAlessandro Barenghi, Gerardo Pelosi, Yannick Teglia. 128-143 [doi]
- A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like SardinesMichael Hutter, Martin Feldhofer, Johannes Wolkerstorfer. 144-159 [doi]
- An Evaluation of Hash Functions on a Power Analysis Resistant Processor ArchitectureSimon Hoerder, Marcin Wójcik, Stefan Tillich, Daniel Page. 160-174 [doi]
- A Comparison of Post-Processing Techniques for Biased Random Number GeneratorsSiew-Hwee Kwok, Yen-Ling Ee, Guanhan Chew, Kanghong Zheng, Khoongming Khoo, Chik-How Tan. 175-190 [doi]
- AES Variants Secure against Related-Key Differential and Boomerang AttacksJiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann. 191-207 [doi]
- Leakage Squeezing Countermeasure against High-Order AttacksHoussem Maghrebi, Sylvain Guilley, Jean-Luc Danger. 208-223 [doi]
- Differential Fault Analysis of the Advanced Encryption Standard Using a Single FaultMichael Tunstall, Debdeep Mukhopadhyay, Subidh Ali. 224-233 [doi]
- Entropy of Selectively Encrypted StringsReine Lundin, Stefan Lindskog. 234-243 [doi]
- Practical Attacks on HB and HB+ ProtocolsZbigniew Golebiewski, Krzysztof Majcher, Filip Zagórski, Marcin Zawada. 244-253 [doi]
- Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 StandardMohammad Hassan Habibi, Mahdi R. Alaghband, Mohammad Reza Aref. 254-263 [doi]
- A SMS-Based Mobile Botnet Using Flooding AlgorithmJingyu Hua, Kouichi Sakurai. 264-279 [doi]
- FIRE: Fault Injection for Reverse EngineeringManuel San Pedro, Mate Soos, Sylvain Guilley. 280-293 [doi]
- Hardware Trojan Side-Channels Based on Physical Unclonable FunctionsZheng Gong, Marc X. Makkes. 294-303 [doi]
- Formal Analysis of Security Metrics and RiskLeanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin. 304-319 [doi]
- STORM - Collaborative Security Management EnvironmentTheodoros Ntouskas, Giorgos Pentafronimos, Spyridon Papastergiou. 320-335 [doi]
- Trust Agreement in Wireless Mesh NetworksAndreas Noack. 336-350 [doi]
- Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless NetworkKun Peng. 351-360 [doi]
- Privacy Respecting Targeted Advertising for Social NetworksChristian Kahl, Stephen Crane, Markus Tschersich, Kai Rannenberg. 361-370 [doi]
- Privacy Protection for Smartphones: An Ontology-Based FirewallJohann Vincent, Christine Porquet, Maroua Borsali, Harold Leboulanger. 371-380 [doi]
- A Study on the Security, the Performance and the Penetration of Wi-Fi Networks in a Greek Urban AreaSavvas Mousionis, Alex Vakaloudis, Constantinos S. Hilas. 381-389 [doi]