Abstract is missing.
- Leaving Room for the Bad GuysMike Bond. 1 [doi]
- Vulnerabilities in First-Generation RFID-enabled Credit CardsThomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O Hare. 2-14 [doi]
- Conditional E-CashLarry Shi, Bogdan Carbunar, Radu Sion. 15-28 [doi]
- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against SplittingLiqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi. 29-44 [doi]
- Panel: RFID Security and PrivacyKevin Fu. 45 [doi]
- Position Statement in RFID S&P Panel: RFID and the MiddlemanRoss Anderson. 46-49 [doi]
- Position Statement in RFID S&P Panel: Contactless Smart CardsJon Callas. 50-52 [doi]
- Position Statement in RFID S&P Panel: From Relative Security to Perceived SecureYvo Desmedt. 53-56 [doi]
- A Model of Onion Routing with Provable AnonymityJoan Feigenbaum, Aaron Johnson, Paul F. Syverson. 57-71 [doi]
- ::::K::::-Anonymous Multi-party Secret HandshakesShouhuai Xu, Moti Yung. 72-87 [doi]
- Using a Personal Device to Strengthen Password Authentication from an Untrusted ComputerMohammad Mannan, Paul C. van Oorschot. 88-103 [doi]
- Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc GroupsYvo Desmedt, Tanja Lange, Mike Burmester. 104-118 [doi]
- On Authentication with HMAC and Non-random PropertiesChristian Rechberger, Vincent Rijmen. 119-133 [doi]
- Hidden Identity-Based SignaturesAggelos Kiayias, Hong-Sheng Zhou. 134-147 [doi]
- Space-Efficient Private Search with Applications to Rateless CodesGeorge Danezis, Claudia Díaz. 148-162 [doi]
- Cryptographic Securities ExchangesChristopher Thorpe, David C. Parkes. 163-178 [doi]
- Improved Multi-party Contract SigningAybek Mukhamedov, Mark Ryan. 179-191 [doi]
- Informant: Detecting Sybils Using IncentivesN. Boris Margolin, Brian Neil Levine. 192-207 [doi]
- Dynamic Virtual Credit Card NumbersIan Molloy, Jiangtao Li, Ninghui Li. 208-223 [doi]
- The Unbearable Lightness of PIN CrackingOmer Berkman, Odelia Moshe Ostrovsky. 224-238 [doi]
- Virtual Economies: Threats and RisksChristopher Thorpe, Jessica Hammer, Jean Camp, Jon Callas, Mike Bond. 239-244 [doi]
- Usable SPACE: Security, Privacy, and Context for the Mobile UserDawn N. Jutla. 245 [doi]
- Personal Digital Rights Management for Mobile Cellular DevicesSiddharth Bhatt, Bogdan Carbunar, Radu Sion, Venu Vasudevan. 246 [doi]
- Certificate Revocation Using Fine Grained Certificate Space PartitioningVipul Goyal. 247-259 [doi]
- An Efficient Aggregate Shuffle Argument SchemeJun Furukawa, Hideki Imai. 260-274 [doi]
- PrefaceRachna Dhamija. 277-279 [doi]
- An Evaluation of Extended Validation and Picture-in-Picture Phishing AttacksCollin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth. 281-293 [doi]
- WSKE: Web Server Key Enabled CookiesChris Masone, Kwang-Hyun Baek, Sean Smith. 294-306 [doi]
- Usability Analysis of Secure Pairing MethodsErsin Uzun, Kristiina Karvonen, N. Asokan. 307-324 [doi]
- Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected SetupCynthia Kuo, Jesse Walker, Adrian Perrig. 325-340 [doi]
- Empirical Studies on Software Notices to Inform Policy Makers and Usability DesignersJens Grossklags, Nathan Good. 341-355 [doi]
- What Instills Trust? A Qualitative Study of PhishingMarkus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim. 356-361 [doi]
- Phishing IQ Tests Measure Fear, Not AbilityVivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad. 362-366 [doi]
- Mental Models of Security RisksFarzaneh Asgharpour, Debin Liu, L. Jean Camp. 367-377 [doi]
- Improving Usability by Adding Security to Video Conferencing SystemsApril Slayden Mitchell, Alan H. Karp. 378-382 [doi]
- A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?Jakob Illeborg Pagter, Marianne Graves Petersen. 383-388 [doi]