Table of contents : Front Matter....Pages - On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography....Pages 1-9 You Can Prove So Many Things in Zero-Knowledge....Pages 10-27 Improvements on Security Proofs of Some Identity Based Encryption Schemes....Pages 28-41 An ID-Based Verifiable Encrypted Signature Scheme Based on Hess’s Scheme....Pages 42-52 ID-Based Signature Scheme Without Trusted PKG....Pages 53-62 Specifying Authentication Using Signal Events in CSP....Pages 63-74 Modeling RFID Security....Pages 75-90 Enforcing Email Addresses Privacy Using Tokens....Pages 91-100 Efficient Authentication of Electronic Document Workflow....Pages 101-112 Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms....Pages 113-127 Efficient Group Signatures from Bilinear Pairing....Pages 128-139 Enhanced Aggregate Signatures from Pairings....Pages 140-149 Constructing Secure Proxy Cryptosystem....Pages 150-161 Towards a General RC4-Like Keystream Generator....Pages 162-174 HCTR: A Variable-Input-Length Enciphering Mode....Pages 175-188 The k th-Order Quasi-Generalized Bent Functions over Ring Z p ....Pages 189-201 A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences....Pages 202-209 An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP....Pages 210-220 An Improved Secure Two-Party Computation Protocol....Pages 221-232 Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes....Pages 233-241 ID-Based Threshold Unsigncryption Scheme from Pairings....Pages 242-253 Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach....Pages 254-264 The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control....Pages 265-278 Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection....Pages 279-289 Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes....Pages 290-301 An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption....Pages 302-312 A Remark on Implementing the Weil Pairing....Pages 313-323 Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC....Pages 324-335 Key Management for Secure Overlay Multicast....Pages 336-345 Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN....Pages 346-357 Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault....Pages 358-369 Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes....Pages 370-383 New Methods to Construct Cheating Immune Multisecret Sharing Scheme....Pages 384-394 Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation....Pages 395-406 MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks....Pages 407-418 Back Matter....Pages -