Abstract is missing.
- Security and privacy considerations in digital deathMichael E. Locasto, Michael Massimi, Peter DePasquale. 1-10 [doi]
- Reducing normative conflicts in information securityWolter Pieters, Lizzie Coles-Kemp. 11-24 [doi]
- A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluationKemal Bicakci, Paul C. van Oorschot. 25-36 [doi]
- Applying problem-structuring methods to problems in computer securityPeter Gutmann. 37-44 [doi]
- Towards a formal model of accountabilityJoan Feigenbaum, Aaron D. Jaggard, Rebecca N. Wright. 45-56 [doi]
- Influencing mental models of security: a research agendaRick Wash, Emilee J. Rader. 57-66 [doi]
- The security cost of cheap user interactionRainer Böhme, Jens Grossklags. 67-82 [doi]
- Position paper: why are there so many vulnerabilities in web applications?Wenliang Du, Karthick Jayaraman, Xi Tan, Tongbo Luo, Steve J. Chapin. 83-94 [doi]
- Resilience is more than availabilityMatt Bishop, Marco Carvalho, Richard Ford, Liam M. Mayron. 95-104 [doi]
- Sherlock holmes' evil twin: on the impact of global inference for online privacyGerald Friedland, Gregor Maier, Robin Sommer, Nicholas Weaver. 105-114 [doi]
- Public security: simulations need to replace conventional wisdomKay Hamacher, Stefan Katzenbeisser. 115-124 [doi]
- Gaming security by obscurityDusko Pavlovic. 125-140 [doi]