Volume 2, Number 1, January 2006
: A Risk Analysis Approach for Biometric Authentication Technology.
, Yang Liu
: Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme.
Volume 2, Number 2, March 2006
, Kefei Chen
: Construction of Dynamic Threshold Decryption Scheme from Pairing.
: Cryptanalysis of the Secure Sessions from Weak Secrets Protocols.
Volume 2, Number 3, May 2006
: Setup-driving Verifiably Committed Signatures Within Standard Complexity Mode.
: Secure Internet Applications Based on Mobile Agents.