Volume 1,
Number 1,
2008
Volume 1,
Number 2,
2008
- Mike Burmester, Breno de Medeiros, Rossana Motta:
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries.
79-90
Electronic Edition (link) BibTeX
- Emmanuel Bresson, Mark Manulis:
Securing group key exchange against strong corruptions and key registration attacks.
91-107
Electronic Edition (link) BibTeX
- Qiong Huang, Duncan S. Wong:
On the relation among various security models for certificateless cryptography.
108-119
Electronic Edition (link) BibTeX
- Thomas Plantard, Willy Susilo, Khin Than Win, Qiong Huang:
Efficient lattice-based signature scheme.
120-132
Electronic Edition (link) BibTeX
- Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong:
An efficient one-move Nominative Signature scheme.
133-143
Electronic Edition (link) BibTeX
- Amir Herzberg, Igal Yoffe:
The layered games framework for specifications and analysis of security protocols.
144-159
Electronic Edition (link) BibTeX
Copyright © Sun May 17 00:01:09 2009
by Michael Ley (ley@uni-trier.de)