Secure universal designated verifier signature without random oracles Xinyi HuangWilly SusiloWei Wu Regular Contribution 05 April 2007 Pages: 171 - 183
IDSIC: an intrusion detection system with identification capability Pei-Te ChenChi-Sung Laih Regular Contribution 26 June 2007 Pages: 185 - 197
Keeping secrets in incomplete databases Joachim BiskupTorben Weibert Regular Contribution 07 August 2007 Pages: 199 - 217
Estimating the maximum information leakage Alessandro AldiniAlessandra Di Pierro Regular Contribution 16 October 2007 Pages: 219 - 242