Analysis Techniques
A New Approach to ? 2 Cryptanalysis of Block Ciphers
Analysis and Optimization of Cryptographically Generated Addresses
Security Analysis of the PACE Key-Agreement Protocol
Towards Security Notions for White-Box Cryptography
A Calculus to Detect Guessing Attacks
Hash Functions
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
On Free-Start Collisions and Collisions for TIB3
Database Security and Biometrics
Detection of Database Intrusion Using a Two-Stage Fuzzy System
Combining Consistency and Confidentiality Requirements in First-Order Databases
Cancelable Iris Biometrics Using Block Re-mapping and Image Warping
Iris Recognition in Nonideal Situations
Algebraic Attacks and Proxy Re-Encryption
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Practical Algebraic Attacks on the Hitag2 Stream Cipher
A New Construction of Boolean Functions with Maximum Algebraic Immunity
Distributed System Security
A2M: Access-Assured Mobile Desktop Computing
Automated Spyware Collection and Analysis
Towards Unifying Vulnerability Information for Attack Graph Construction
Traitor Tracing without A Priori Bound on the Coalition Size
SISR - A New Model for Epidemic Spreading of Electronic Threats
Identity Management and Authentication
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
Robust Authentication Using Physically Unclonable Functions
Risks of the CardSpace Protocol
Applied Cryptography
Fair E-Cash: Be Compact, Spend Faster
On the Security of Identity Based Ring Signcryption Schemes
A Storage Efficient Redactable Signature in the Standard Model
Generic Construction of Stateful Identity Based Encryption
Access Control
Privacy-Aware Attribute-Based Encryption with User Accountability
Hardware-Assisted Application-Level Access Control
Towards Trustworthy Delegation in Role-Based Access Control Model
Secure Interoperation in Multidomain Environments Employing UCON Policies
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control
MAC and Nonces
Nonce Generators and the Nonce Reset Problem
MAC Precomputation with Applications to Secure Memory
HMAC without the "Second" Key
P2P and Web Services
Adding Trust to P2P Distribution of Paid Content
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.