Abstract is missing.
- Computing of Trust in Ad-Hoc NetworksHuafei Zhu, Feng Bao, Jianwei Liu. 1-11 [doi]
- TAO: Protecting Against Hitlist Worms Using Transparent Address ObfuscationSpyros Antonatos, Kostas G. Anagnostakis. 12-21 [doi]
- On the Privacy Risks of Publishing Anonymized IP Network TracesD. Koukis, Spyros Antonatos, Kostas G. Anagnostakis. 22-32 [doi]
- Secure Mobile Notifications of Civilians in Case of a DisasterHeiko Rossnagel, Tobias Scherner. 33-42 [doi]
- A Fair Anonymous Submission and Review SystemVincent Naessens, Liesje Demuynck, Bart De Decker. 43-53 [doi]
- Attribute Delegation Based on Ontologies and Context InformationIsaac Agudo, Javier Lopez, José A. Montenegro. 54-66 [doi]
- Adding Support to XACML for Dynamic Delegation of Authority in Multiple DomainsDavid W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen. 67-86 [doi]
- One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key ExchangeJeong Ok Kwon, Kouichi Sakurai, Dong-Hoon Lee. 87-96 [doi]
- Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers ApartElias Athanasopoulos, Spyros Antonatos. 97-108 [doi]
- Perturbing and Protecting a Traceable Block CipherJulien Bringer, Hervé Chabanne, Emmanuelle Dottax. 109-119 [doi]
- A New Encryption and Hashing Scheme for the Security Architecture for MicroprocessorsJörg Platte, Raúl Durán Díaz, Edwin Naroska. 120-129 [doi]
- Timed Release Cryptography from Bilinear Pairings Using Hash ChainsKonstantinos Chalkias, George Stephanides. 130-140 [doi]
- Compression of Encrypted Visual DataMichael Gschwandtner, Andreas Uhl, Peter Wild. 141-150 [doi]
- Selective Encryption for Hierarchical MPEGHeinz Hofbauer, Thomas Stütz, Andreas Uhl. 151-160 [doi]
- Equivalence Analysis Among DIH, SPA, and RS Steganalysis MethodsXiangyang Luo, Chunfang Yang, Fenlin Liu. 161-172 [doi]
- A Flexible and Open DRM FrameworkKristof Verslype, Bart De Decker. 173-184 [doi]
- PPINA - A Forensic Investigation Protocol for Privacy Enhancing TechnologiesGiannakis Antoniou, Campbell Wilson, Dimitris Geneiatakis. 185-195 [doi]
- A Privacy Agent in Context-Aware Ubiquitous Computing EnvironmentsNi (Jenny) Zhang, Chris Todd. 196-205 [doi]
- Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit SystemsSeng-Phil Hong, Sungmin Kang. 206-215 [doi]
- Attack Graph Based Evaluation of Network SecurityIgor V. Kotenko, Mikhail Stepashkin. 216-227 [doi]
- Information Modeling for Automated Risk AnalysisHoward Chivers. 228-239 [doi]
- Towards Practical Attacker Classification for Risk Analysis in Anonymous CommunicationAndriy Panchenko, Lexi Pimenidis. 240-251 [doi]