Relations between the security models for certificateless encryption and ID-based key agreement D. FioreR. GennaroN. P. Smart Regular Contribution 19 October 2011 Pages: 1 - 22
Threshold distributed access control with public verification: a practical application of PVSS Kun Peng Regular Contribution 21 October 2011 Pages: 23 - 31
A warning on how to implement anonymous credential protocols into the information card framework Mikaƫl AtesFrancesco BuccafurriGianluca Lax Regular Contribution 22 October 2011 Pages: 33 - 40
Stochastic game net and applications in security analysis for enterprise network Yuanzhuo WangMin YuXueqi Cheng Regular Contribution 22 October 2011 Pages: 41 - 52
A new efficient optimistic fair exchange protocol without random oracles Qiong HuangGuomin YangWilly Susilo Regular Contribution 01 December 2011 Pages: 53 - 63