Abstract is missing.
- Multilateral Security: Enabling Technologies and Their EvaluationAndreas Pfitzmann. 1-13 [doi]
- Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender SystemsShyong K. Lam, Dan Frankowski, John Riedl. 14-29 [doi]
- Optimized Workflow Authorization in Service Oriented ArchitecturesMartin Wimmer, Martina-Cezara Albutiu, Alfons Kemper. 30-44 [doi]
- Dynamic Layer-2 VPN Services for Improving Security in the Grid EnvironmentFrancesco Palmieri. 45-59 [doi]
- A P2P Content Authentication Protocol Based on Byzantine AgreementEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda. 60-72 [doi]
- Transitive Trust in Mobile ScenariosNicolai Kuntze, Andreas U. Schmidt. 73-85 [doi]
- An Open, PKI-Based Mobile Payment SystemMarko Hassinen, Konstantin Hyppönen, Keijo Haataja. 86-100 [doi]
- Secure Rejoining Scheme for Dynamic Sensor NetworksYoung-Sik Hwang, Seung Wan Han, Taek Yong Nam. 101-114 [doi]
- Developing Provable Secure M-Commerce ApplicationsHolger Grandy, Dominik Haneberg, Wolfgang Reif, Kurt Stenzel. 115-129 [doi]
- An Algebra for Enterprise Privacy Policies Closed Under Composition and ConjunctionDominik Raub, Rainer Steinwandt. 130-144 [doi]
- Privacy-Preserving Decision Tree Mining Based on Random SubstitutionsJim Dowd, Shouhuai Xu, Weining Zhang. 145-159 [doi]
- Policy-Based Integration of User and Provider-Sided Identity ManagementWolfgang Hommel. 160-174 [doi]
- Privacy with Delegation of Rights by Identity ManagementSven Wohlgemuth, Günter Müller. 175-190 [doi]
- A Framework for Quantification of Linkability Within a Privacy-Enhancing Identity Management SystemSebastian Clauß. 191-205 [doi]
- Revocable AnonymityStefan Köpsell, Rolf Wendolsky, Hannes Federrath. 206-220 [doi]
- Low Latency Anonymous Communication - How Long Are Users Willing to Wait?Stefan Köpsell. 221-237 [doi]
- Security Engineering Using Problem FramesDenis Hatebur, Maritta Heisel, Holger Schmidt. 238-253 [doi]
- SecTOOL - Supporting Requirements Engineering for Access ControlSteffen Kolarczyk, Manuel Koch, Klaus-Peter Löhr, Karl Pauls. 254-267 [doi]
- Possibilistic Information Flow Control in MAKS and Action RefinementDieter Hutter. 268-281 [doi]
- Toward a Framework for Forensic Analysis of Scanning WormsIhab Hamadeh, George Kesidis. 282-297 [doi]
- A Comparison of Market Approaches to Software Vulnerability DisclosureRainer Böhme. 298-311 [doi]
- Reliable Keystroke Biometric System Based on a Small Number of Keystroke SamplesWoojin Chang. 312-320 [doi]
- Allowing State Changes in SpecificationsMichael Barnett, David A. Naumann, Wolfram Schulte, Qi Sun. 321-336 [doi]
- Field Access Analysis for Enforcing Access Control PoliciesKathrin Lehmann, Peter Thiemann. 337-351 [doi]
- Controlling Access to Documents: A Formal Access Control ModelPaul E. Sevinç, David A. Basin, Ernst-Rüdiger Olderog. 352-367 [doi]
- How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer s SecurityJürgen Nützel, Anja Beyer. 368-380 [doi]
- Secure End-to-End Transport over SCTPCarsten Hohendorf, Erwin P. Rathgeb, Esbold Unurkhaan, Michael Tüxen. 381-395 [doi]
- An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect InformationAlmudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda. 396-408 [doi]
- Filtering for Private Collaborative BenchmarkingFlorian Kerschbaum, Orestis Terzidis. 409-422 [doi]
- On the Use of Word Networks to Mimicry Attack DetectionFernando Godínez, Dieter Hutter, Raul Monroy. 423-435 [doi]
- Simplifying Signature Engineering by ReuseSebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier. 436-450 [doi]
- Redesign and Implementation of Evaluation Dataset for Intrusion Detection SystemJun Qian, Chao Xu, Meilin Shi. 451-465 [doi]
- Requirements of Information Reductions for Cooperating Intrusion Detection AgentsUlrich Flegel, Joachim Biskup. 466-480 [doi]
- Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer AgeArthur Schmidt. 481-493 [doi]
- Kleptographic Attacks on E-Voting SchemesMarcin Gogolewski, Marek Klonowski, Przemyslaw Kubiak, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski. 494-508 [doi]
- Visual Document Authentication Using Human-Recognizable WatermarksIgor Fischer, Thorsten Herfet. 509-521 [doi]