Abstract is missing.
- Information Sharing in the 21st century: Progress and ChallengesEd Dawson, Jason Reid, Farzad Salim, Mark Burdon. 2 [doi]
- Secure Coprocessor-based Private Information Retrieval without Periodical PreprocessingPeishun Wang, Huaxiong Wang, Josef Pieprzyk. 5-11 [doi]
- Reconstruction of Falsified Computer Logs for Digital Forensics InvestigationsMaolin Tang, Colin J. Fidge. 12-21 [doi]
- Advantages and vulnerabilities of pull-based email-deliveryNatascha Chrobok, Andrew Trotman, Richard A. O'Keefe. 22-31 [doi]
- An Administrative Model for UCON ABCFarzad Salim, Jason Reid, Ed Dawson. 32-38 [doi]
- Impeding CAPTCHA Breakers with Visual DecryptionSimon R. Lang, Neville I. Williams. 39-46 [doi]
- Information security culture: A Behaviour Compliance Conceptual FrameworkSalahuddin Alfawaz, Karen Nelson, Kavoos Mohannak. 47-55 [doi]
- Multi-Factor Password-Authenticated Key ExchangeDouglas Stebila, Poornaprajna Udupi, Sheueling Chang Shantz. 56-66 [doi]
- An Analysis of the RC4 Family of Stream Ciphers against Algebraic AttacksKenneth Koon-Ho Wong, Gary Carter, Ed Dawson. 67-74 [doi]
- Certificateless Key Agreement in the Standard ModelGeorg Lippold, Juanma González Nieto. 75-85 [doi]
- Combinatorial Multicollision Attacks on Generalized Iterated Hash FunctionsKimmo Halunen, Juha Kortelainen, Tuomas Kortelainen. 86-93 [doi]