5. ACNS 2007: Zhuhai, China

Signature Schemes I

Computer and Network Security

Cryptanalysis

Group-Oriented Security

Cryptographic Protocols

Anonymous Authentication

Identity-Based Cryptography

Security in Wireless, Ad-Hoc, and Peer-to-Peer Networks

Efficient Implementation

Signature Schemes II