Editorial Board
Nearest neighbors search using point location in balls with applications to approximate Voronoi decompositions
Provably secure threshold password-authenticated key exchange
Password-based authentication and key distribution protocols with perfect forward secrecy
Tolerant property testing and distance approximation
Error-bounded probabilistic computations between MA and AM
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
Optimal rate-based scheduling on multiprocessors
Contents