A case study in hardware Trojan design and implementation Alex BaumgartenMichael SteffenJoseph Zambreno Regular Contribution 03 September 2010 Pages: 1 - 14
Identity-based cryptography for grid security Hoon Wei LimKenneth G. Paterson Regular Contribution 10 September 2010 Pages: 15 - 32
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency Kun PengEd DawsonFeng Bao Regular Contribution 25 September 2010 Pages: 33 - 47
A general and efficient countermeasure to relation attacks in mix-based e-voting Kun Peng Regular Contribution 04 November 2010 Pages: 49 - 60