| |
| |
On the Effectiveness of Internal Patching Against File-Sharing Worms | |
| |
| |
| |
Peeking Through the Cloud: DNS-Based Estimation and Its Applications | |
| |
| |
| |
Pushback for Overlay Networks: Protecting Against Malicious Insiders | |
| |
| |
| |
PPAA: Peer-to-Peer Anonymous Authentication | |
| |
| |
| |
Generic Constructions of Stateful Public Key Encryption and Their Applications | |
| |
| |
| |
Traceable and Retrievable Identity-Based Encryption | |
| |
| |
| |
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures | |
| |
| |
| |
Attacking Reduced Round SHA-256 | |
| |
| |
| |
DAKOTA - Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography | |
| |
| |
| |
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA? | |
| |
| |
| |
Replay Attack in a Fair Exchange Protocol | |
| |
| |
| |
Improved Conditional E-Payments | |
| |
| |
| |
Anonymity in Transferable E-cash | |
| |
| |
| |
Generic Security-Amplifying Methods of Ordinary Digital Signatures | |
| |
| |
| |
New Differential-Algebraic Attacks and Reparametrization of Rainbow | |
| |
| |
| |
Trapdoor Sanitizable Signatures and Their Application to Content Protection | |
| |
| |
| |
Multi-factor Authenticated Key Exchange | |
| |
| |
| |
Repelling Detour Attack Against Onions with Re-encryption | |
| |
| |
| |
Analysis of EAP-GPSK Authentication Protocol | |
| |
| |
| |
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns | |
| |
| |
| |
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol | |
| |
| |
| |
An Authentication Scheme Based on the Twisted Conjugacy Problem | |
| |
| |
| |
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance | |
| |
| |
| |
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation | |
| |
| |
| |
On the Security of the CCM Encryption Mode and of a Slight Variant | |
| |
| |
| |
wN AF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm | |
| |
| |
| |
A Very Compact "Perfectly Masked" S-Box for AES | |
| |
| |
| |
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks | |
| |
| |
| |
Traceable Privacy of Recent Provably-Secure RFID Protocols | |
| |
| |
| |
The Security of EPC Gen2 Compliant RFID Protocols | |
| |
| |
| |
Author Index | |