Volume 1, Issue 2/3, August 2011 (BibTex)
Provable Security

pp. 1-3
Guest Editorial: Special Issue on Provable Security                                                                     
Xiaofeng Chen

pp. 4-20
VDC-Based Dynamic Code Analysis: Application to C Programs                                                           
Wissam Mallouli, Amel Mammar, Ana Cavalli and Willy Jimenez

pp. 21-31   
Algorithm for Generating Primes for the Giuliani-Gong Public Key System 
Maciej Grześkowiak

pp. 32-43
An eCK-Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security                                                          
Hai Huang

pp. 44-56
A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving
Dexin Yang and Bo Yang

pp. 57-73
Programmability in the Generic Ring and Group Models 
Mario Larangeira and Keisuke Tanaka

pp. 74-88   
General Construction of Chameleon All-But-One Trapdoor Functions 
Shengli Liu, Junzuo Lai and Robert H. Deng

pp. 89-106
A Novel Framework for Protocol Analysis                                                          
Kristian Gjøsteen, George Petrides and Asgeir Steine

pp. 107-124
TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption
Jiaxin Pan and Libin Wang

pp. 125-139
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems
Yutaka Kawai, Yusuke Sakai and Noboru Kunihiro

pp. 140-160
Improving the Security of an Efficient Unidirectional Proxy Re-Encryption Scheme
Sébastien Canard, Julien Devigne and Fabien Laguillaumie

pp. 161-180
Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes 
Sumit Kumar Pandey and Rana Barua

This special issue is financially supported by the National Natural Science Foundation of China (No.60970144), China 
111 Project (No.B08038), 
and Key Laboratory of Computer Networks and Information Security, Ministry of Education, Xidian University.

[Goto Archives] 
free templates