Identity-Based Encryption.- Adaptive-ID Secure Revocable Identity-Based Encryption.- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption.- Protocol Analysis.- Attacks on the DECT Authentication Mechanisms.- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth...