News
Journals
- On Weak Keys and Forgery Attacks Aainst Polynomial-based MAC Schemes [more from Cryptology ePrint Archive]
- New issue of Computers & Security – request full text of any article
Reports
Calls for Papers
- 8th International Workshop on Critical Information Infrastructures Security [Amsterdam Sept. 16-18, 2013 – papers due 5/10]
- 14th International Workshop on Information Security Applications [Jeju Island, Korea, Aug. 19-21, 2013 – papers due 5/31]
- 8th International Workshop on Data Privacy Management [Egham, UK, Sept. 12-13, 2013 – papers due 6/2]
- 2nd International Workshop in Quantitative Aspects in Security Assurance [Egham, UK, Sept. 12-13, 2013 – papers due 6/5]