
International Journal of Applied Cryptography
2009 Vol.1 No.4
Pages | Title and author(s) |
251-263 | Secure offline superdistribution for mobile platformsMarko Wolf, Andre Osterhues, Christian Stueble DOI: 10.1504/IJACT.2009.028026 |
264-289 | A five-round algebraic property of AES and its application to the ALPHA-MACJianyong Huang, Jennifer Seberry, Willy Susilo DOI: 10.1504/IJACT.2009.028027 |
290-308 | User-aware provably secure protocols for browser-based mutual authenticationSebastian Gajek, Mark Manulis, Jorg Schwenk DOI: 10.1504/IJACT.2009.028028 |
309-319 | Multiuser private queries over encrypted databasesYanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng DOI: 10.1504/IJACT.2009.028029 |
320-322 | Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik DOI: 10.1504/IJACT.2009.028030 |
323-324 | A correction to 'efficient and secure comparison for on-line auctions'Ivan Damgard, Martin Geisler, Mikkel Kroigard DOI: 10.1504/IJACT.2009.028031 |