Abstract is missing.
- Emergent properties in ad-hoc networks: a security perspectiveVirgil D. Gligor. 1 [doi]
- Secure information sharing enabled by Trusted Computing and PEI modelsRavi S. Sandhu, Kumar Ranganathan, Xinwen Zhang. 2-12 [doi]
- TRUST: in cyberspace and beyondShankar Sastry. 13 [doi]
- Attack graph generation and analysisJeannette M. Wing. 14 [doi]
- Security vulnerabilities: from measurements to designRavishankar K. Iyer. 15 [doi]
- Can machine learning be secure?Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar. 16-25 [doi]
- Improving secure server performance by re-balancing SSL/TLS handshakesClaude Castelluccia, Einar Mykletun, Gene Tsudik. 26-34 [doi]
- Provably secure password-based authentication in TLSMichel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval. 35-45 [doi]
- Certified mailing listsHimanshu Khurana, Hyung-Seok Hahm. 46-58 [doi]
- Designated group credentialsChing Yu Ng, Willy Susilo, Yi Mu. 59-65 [doi]
- Privacy-preserving semantic interoperation and access control of heterogeneous databasesPrasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri. 66-77 [doi]
- Publicly verifiable ownership protection for relational databasesYingjiu Li, Robert Huijie Deng. 78-89 [doi]
- Measuring intrusion detection capability: an information-theoretic approachGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric. 90-101 [doi]
- Time series modeling for IDS alert managementJouni Viinikka, Hervé Debar, Ludovic Mé, Renaud Séguier. 102-113 [doi]
- Augmenting storage with an intrusion response primitive to ensure the security of critical dataAshish Gehani, Surendar Chandra, Gershon Kedem. 114-124 [doi]
- Design space and analysis of worm defense strategiesDavid Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song. 125-137 [doi]
- Self-organised group key management for ad hoc networksLing Luo, Reihaneh Safavi-Naini, Joonsang Baek, Willy Susilo. 138-147 [doi]
- Lightweight, pollution-attack resistant multicast authentication schemeYa-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin. 148-156 [doi]
- An attack-localizing watermarking scheme for natural language documentsGaurav Gupta, Josef Pieprzyk, Huaxiong Wang. 157-165 [doi]
- Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithmSoo-Chang Pei, Yi-Chong Zeng. 166-174 [doi]
- Image-adaptive watermarking based on perceptually shaping watermark blockwiseXinshan Zhu, Yong Gao 0002, Yan Zhu. 175-181 [doi]
- Finding the original point set hidden among chaffEe-Chien Chang, Ren Shen, Francis Weijian Teo. 182-188 [doi]
- Software integrity protection using timed executable agentsJuan A. Garay, Lorenz Huelsbergen. 189-200 [doi]
- Application security support in the operating system kernelManigandan Radhakrishnan, Jon A. Solworth. 201-211 [doi]
- Supporting location-based conditions in access control policiesClaudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. 212-222 [doi]
- A secure system for data access based on anonymous authentication and time-dependent hierarchical keysWen-Guey Tzeng. 223-230 [doi]
- ApprovabilityJon A. Solworth. 231-242 [doi]
- Safety analysis of usage control authorization modelsXinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce. 243-254 [doi]
- Fortifying password authentication in integrated healthcare delivery systemsYanjiang Yang, Robert H. Deng, Feng Bao. 255-265 [doi]
- Collusion secure convolutional fingerprinting information codesYan Zhu, Wei Zou, Xinshan Zhu. 266-274 [doi]
- Periodicity, complementarity and complexity of 2-adic FCSR combiner generatorsS. Anand, Gurumurthi V. Ramanan. 275-282 [doi]
- Cryptanalysis of the Grain family of stream ciphersAlexander Maximov. 283-288 [doi]
- Addressing the shortcomings of one-way chainsRoberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil. 289-296 [doi]
- Ring signatures without random oraclesSherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen. 297-302 [doi]
- An efficient key establishment scheme for secure aggregating sensor networksErik-Oliver Blaß, Martina Zitterbart. 303-310 [doi]
- An efficient broadcast authentication scheme in wireless sensor networksShang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh. 311-320 [doi]
- Identity-based registry for secure interdomain routingE-yong Kim, Klara Nahrstedt, Li Xiao, Kunsoo Park. 321-331 [doi]
- Dynamic rule-ordering optimization for high-speed firewall filteringHazem Hamed, Ehab Al-Shaer. 332-342 [doi]
- Digitally signed document sanitizing scheme based on bilinear mapsKunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai. 343-354 [doi]
- Digital invisible ink: revealing true secrets via attackingChun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu. 355 [doi]
- Quadtree based perceptual watermarking schemeShan Ming Tsu, W. S. Hsieh. 356 [doi]
- Continuous fingerprints classification by symmetrical filtersJun Li, Wei-Yun Yau, Han Wang. 357 [doi]
- A general design towards secure ad-hoc collaborationMasayuki Nakae, Xinwen Zhang, Ravi S. Sandhu. 358 [doi]
- A distributed key assignment protocol for secure multicast based on proxy cryptographyChun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei. 359 [doi]
- An efficient secure communication between set-top box and smart card in DTV broadcastingJiun-Tze Lai, Ting-Wei Hou. 360 [doi]
- Forgery attack on the RPC incremental unforgeable encryption schemeChuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh. 361 [doi]
- A control flow obfuscation method to discourage malicious tampering of software codesY. L. Huang, F. S. Ho, H. Y. Tsai, H. M. Kao. 362 [doi]
- Problems on the MR micropayment schemesMasahiro Mambo, Moises Rosales Salinas, Kazuo Ohta, Noboru Kunihiro. 363 [doi]
- Design and implementation of a reconfigurable hardware for secure embedded systemsKuen-Cheng Chiang, Zhi-Wei Chen, Jean Jyh-Jiun Shann. 364 [doi]
- Democratic group signatures: on an example of joint venturesMark Manulis. 365 [doi]
- Analysis of traceability attack on Camenisch et al. s blind signature schemesLin-Chuan Wu. 366 [doi]
- Restricted message signingToshihiko Matsuo. 367 [doi]
- Policy-based encryption schemes from bilinear pairingsWalid Bagga, Refik Molva, Stefano Crosta. 368 [doi]
- A refined look at Bernstein s AES side-channel analysisMichael Neve, Jean-Pierre Seifert, Zhenghong Wang. 369 [doi]