Simplified security notions of direct anonymous attestation and a concrete scheme from pairings Ernie BrickellLiqun ChenJiangtao Li Regular Contribution 10 February 2009 Pages: 315 - 330
Negative representations of information Fernando EspondaStephanie ForrestPaul Helman Regular Contribution 14 April 2009 Pages: 331 - 345
On the pseudo-freeness and the CDH assumption Shingo HasegawaShuji IsobeKatsuhiro Tashiro Regular Contribution 23 June 2009 Pages: 347 - 355
CRUST: cryptographic remote untrusted storage without public keys Erel GeronAvishai Wool regular contribution 05 June 2009 Pages: 357 - 377
A secret sharing scheme based on (t, n) threshold and adversary structure Huawang QinYuewei DaiZhiquan Wang Regular Contribution 09 June 2009 Pages: 379 - 385