• Short paper: Random IDs for preserving location privacy

  • Short Paper: Thor - The Hybrid Online Repository

  • Short Paper: Schemes for Enhancing the Denial-of-Service Tolerance of SRTP

  • Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption

  • Short Paper: Limitations of Key Escrow in Identity-Based Schemes in Ad Hoc Networks

  • Short Paper: Practically Unbounded One-Way Chains for Authentication with Backward Secrecy

  • Short Paper: GKE: Efficient Group-based Key Establishment for Large Sensor Networks

  • Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information

  • MOTET: Mobile Transactions using Electronic Tickets

  • Soft-Timeout Distributed Key Generation for Digital Signature based on Elliptic Curve D-log for Low-Power Devices