Abstract is missing.
- Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FWPablo Neira Ayuso, Rafael M. Gasca, Laurent Lefèvre. 1-17 [doi]
- Identifying Critical Attack Assets in Dependency Attack GraphsReginald E. Sawilla, Xinming Ou. 18-34 [doi]
- Online Risk Assessment of Intrusion Scenarios Using D-S Evidence TheoryC. P. Mu, X. J. Li, H. K. Huang, S. F. Tian. 35-48 [doi]
- Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETsRosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen. 49-65 [doi]
- Efficient Handling of Adversary Attacks in Aggregation ApplicationsGelareh Taban, Virgil D. Gligor. 66-81 [doi]
- Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is EnoughBezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu. 82-96 [doi]
- Dismantling MIFARE ClassicFlavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs. 97-114 [doi]
- A Browser-Based Kerberos Authentication SchemeSebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk. 115-129 [doi]
- CROO: A Universal Infrastructure and Protocol to Detect Identity FraudD. Nali, Paul C. van Oorschot. 130-145 [doi]
- Disclosure Analysis and Control in Statistical DatabasesYingjiu Li, Haibing Lu. 146-160 [doi]
- TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time OverheadKun Bai, Meng Yu, Peng Liu. 161-176 [doi]
- Access Control Friendly Query Verification for Outsourced Data PublishingHong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang. 177-191 [doi]
- Sharemind: A Framework for Fast Privacy-Preserving ComputationsDan Bogdanov, Sven Laur, Jan Willemson. 192-206 [doi]
- Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT FirmsAthanassios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas. 207-222 [doi]
- Remote Integrity Check with Dishonest Storage ServerEe-Chien Chang, Jia Xu. 223-237 [doi]
- A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay NetworksJuan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnoutse, Joan García-Haro. 238-250 [doi]
- RFID Privacy Models RevisitedChing Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini. 251-266 [doi]
- A New Formal Proof Model for RFID Location PrivacyJungHoon Ha, Sang-Jae Moon, Jianying Zhou, JaeCheol Ha. 267-281 [doi]
- Distributed Authorization by Multiparty Trust NegotiationCharles C. Zhang, Marianne Winslett. 282-299 [doi]
- Compositional Refinement of Policies in UML - Exemplified for Access ControlBjørnar Solhaug, Ketil Stølen. 300-316 [doi]
- On the Security of Delegation in Access Control SystemsQihua Wang, Ninghui Li, Hong Chen. 317-332 [doi]
- Termination-Insensitive Noninterference Leaks More Than Just a BitAslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands. 333-348 [doi]
- Security Provisioning in Pervasive Environments Using Multi-objective OptimizationRinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley. 349-363 [doi]
- Improved Security Notions and Protocols for Non-transferable IdentificationCarlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti. 364-378 [doi]
- Human Readable Paper Verification of Prêt à VoterDavid Lundin, Peter Y. A. Ryan. 379-395 [doi]
- A Distributed Implementation of the Certified Information Access ServiceCarlo Blundo, Emiliano De Cristofaro, Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano. 396-410 [doi]
- Exploring User Reactions to New Browser Cues for Extended Validation CertificatesJennifer Sobey, Robert Biddle, Paul C. van Oorschot, Andrew S. Patrick. 411-427 [doi]
- A Framework for the Analysis of Mix-Based Steganographic File SystemsClaudia Díaz, Carmela Troncoso, Bart Preneel. 428-445 [doi]
- An Adaptive Policy-Based Approach to SPIT ManagementYannis Soupionis, Stelios Dritsas, Dimitris Gritzalis. 446-460 [doi]
- Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?Carlton R. Davis, Stephen Neville, José M. Fernández, Jean-Marc Robert, John McHugh. 461-480 [doi]
- Eureka: A Framework for Enabling Static Malware AnalysisMonirul I. Sharif, Vinod Yegneswaran, Hassen Saïdi, Phillip A. Porras, Wenke Lee. 481-500 [doi]
- New Considerations about the Correct Design of Turbo Fingerprinting CodesJoan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano. 501-516 [doi]
- Formally Bounding the Side-Channel Leakage in Unknown-Message AttacksMichael Backes, Boris Köpf. 517-532 [doi]
- Cryptographic Protocol Explication and End-Point ProjectionJay A. McCarthy, Shriram Krishnamurthi. 533-547 [doi]
- State Space Reduction in the Maude-NRL Protocol AnalyzerSantiago Escobar, Catherine Meadows, José Meseguer. 548-562 [doi]
- Code-Carrying AuthorizationSergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon. 563-579 [doi]
- CPU Bugs, CPU Backdoors and Consequences on SecurityLoïc Duflot. 580-599 [doi]