Abstract is missing.
- Future Trends in Mobile Commerce: Service Offerings, Technological Advances and Security ChallengesAli Grami, Bernadette Schell. 1-14 [doi]
- Building Online Trust through Socially Rich Web InterfacesMilena M. Head, Khaled Hassanein. 15-22 [doi]
- Familiarity and Trust: Measuring Familiarity with a Web SiteJie Zhang, Ali A. Ghorbani. 23-28 [doi]
- Design and Prototype of a Coercion-Resistant, Verifiable Electronic Voting SystemAnna Shubina, Sean W. Smith. 29-39 [doi]
- Practical Remote Electronic Elections for the UKTim Storer, Ishbel Duncan. 41-45 [doi]
- Combating Spam with TEAJean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen. 47-58 [doi]
- Supporting Privacy in E-Learning with Semantic StreamsLori Kettel, Christopher A. Brooks, Jim E. Greer. 59-67 [doi]
- Secure Public Instant MessagingMohammad Mannan, Paul C. van Oorschot. 69-77 [doi]
- Determining Internet Users Values for Private InformationScott Buffett, Nathan Scott, Bruce Spencer, Michael Richter, Michael W. Fleming. 79-88 [doi]
- Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer ConvenienceStephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen. 89-101 [doi]
- An Architecture for Identity Management (August 2004)Brian R. Richardson, Jim E. Greer. 103-108 [doi]
- A Diagrammatical Framework for Information Systems AttacksTerry Roebuck. 109-117 [doi]
- Structural Concepts for Trust, Contract and Security Management for a Virtual Chemical Engineering OrganisationPanayiotis Periorellis, Christopher J. W. Townson, Philip English. 119-130 [doi]
- Online Gaming Crime and Security Issue - Cases and Countermeasures from TaiwanYing-Chieh Chen, Patrick S. Chen, Ronggong Song, Larry Korba. 131-136 [doi]
- The Sensitivities of User Profile Information in Music Recommender SystemsEvelien van de Garde-Perik, Boris E. R. de Ruyter, Panos Markopoulos, Berry Eggen. 137-141 [doi]
- Towards secure interaction in agent societiesBastin Tony Roy Savarimuthu, Martin K. Purvis, Marcos De Oliveira, Maryam Purvis. 143-148 [doi]
- infoDNA (Version 2) Agent Enhanced Trustworthy Distributed InformationStephen Marsh. 149-153 [doi]
- Syntax-based Vulnerability Testing of Frame-based Network ProtocolsOded Tal, Scott Knight, Thomas R. Dean. 155-160 [doi]
- Formal Implementation of Network Security PoliciesAlexandre Lacasse, Mohamed Mejri, Béchir Ktari. 161-166 [doi]
- A novel visualization technique for network anomaly detectionIosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani. 167-174 [doi]
- A Declarative Approach to Stateful Intrusion Detection and Network MonitoringMathieu Couture, Béchir Ktari, Mohamed Mejri, Frédéric Massicotte. 175-179 [doi]
- Application of Belief-Desire-Intention Agents in Intrusion Detection & ResponseMehdi Shajari, Ali A. Ghorbani. 181-191 [doi]
- Detection of New Malicious Code Using N-grams SignaturesTony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan. 193-196 [doi]
- Current Trends and Advances in Information Assurance MetricsNabil Seddigh, Peter Pieda, Ashraf Matrawy, Biswajit Nandy, Ioannis Lambadaris, Adam Hatfield. 197-205 [doi]
- :::::::x:::::::Trust: A Scalable Trust Management InfrastructureMarc Branchaud, Scott Flinn. 207-218 [doi]
- Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured CommunitiesDeholo Nali, Ali Miri, Carlisle M. Adams. 219-223 [doi]