Table of Contents:
  • Signatures
  • Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles
  • A Generic Construction for Universally-Convertible Undeniable Signatures
  • Fast Digital Signature Algorithm Based on Subgraph Isomorphism
  • Efficient ID-Based Digital Signatures with Message Recovery
  • Network Security
  • Achieving Mobility and Anonymity in IP-Based Networks
  • Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
  • Forward-Secure Key Evolution in Wireless Sensor Networks
  • A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations
  • An Intelligent Network-Warning Model with Strong Survivability
  • Running on Karma – P2P Reputation and Currency Systems
  • Secure Keyword Search and Private Information Retrieval
  • Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption
  • Extended Private Information Retrieval and Its Application in Biometrics Authentications
  • Public Key Encryption
  • Strongly Secure Certificateless Public Key Encryption Without Pairing
  • Intrusion Detection
  • Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems
  • Email Security
  • How to Secure Your Email Address Book and Beyond
  • Denial of Service Attacks
  • Toward Non-parallelizable Client Puzzles
  • Authentication
  • Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authentication.