Abstract is missing.
- NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptographyMawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah. 2-10 [doi]
- Temporal factors to evaluate trustworthiness of virtual identitiesLuca Longo, Pierpaolo Dondio, Stephen Barrett. 11-19 [doi]
- Trustworthiness of collaborative Open Source Software quality assessmentJean-Marc Seigneur. 20-26 [doi]
- An entropy based method for measuring anonymityMichele Bezzi. 28-32 [doi]
- Flexible and high-performance anonymization of NetFlow records using anontoolMichalis Foukarakis, Demetres Antoniades, Spyros Antonatos, Evangelos P. Markatos. 33-38 [doi]
- Practical anonymous communication on the mobile internet using TorChrister Andersson, Andriy Panchenko. 39-48 [doi]
- SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffsWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham. 49-56 [doi]
- Secure computation for data privacyMeena Dilip Singh, Ashutosh Saxena. 58-62 [doi]
- An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEcturesWassim Itani, Ayman I. Kayssi, Ali Chehab. 63-72 [doi]
- Scalable discovery of private resourcesSpyros Kotoulas, Ronny Siebes. 73-82 [doi]
- A context service for multimodal pervasive environmentsAntonio Coronato, Giuseppe De Pietro. 84-87 [doi]
- Beyond web 2.0: enabling multimodal web interactions using VoIP and AjaxGiovanni Frattini, Pierpaolo Petriccione, Giuseppe Leone, Gianluca Supino, Fabio Corvino. 89-97 [doi]
- iToken: aWireless smart card reader which provides handhelds with desk top equivalent securityGiuseppe Cattaneo, Luigi Catuogno, Fabio Petagna, G. Di Matteo, Luigi Romano. 98-106 [doi]
- Web Services workflow reliability estimation through reliability patternsLuigi Coppolino, Luigi Romano, Nicola Mazzocca, Sergio Salvi. 107-115 [doi]
- The CONNECT platform: An architecture for Context-Aware Privacy in pervasive environmentsSusana Alcalde Bagüés, Jelena Mitic, Elisabeth-Anna Emberger. 117-126 [doi]
- Privacy-preserving authentication with low computational overhead for RFID systemsFen Liu, Lei Hu, Li Lu, Weijia Wang. 127-132 [doi]
- A study on secure RFID authentication protocol in insecure communicationJang-Su Park, Soo-Young Kang, Im-Yeong Lee. 133-143 [doi]
- Optimizing secure Web Services with MAWeS: A case studyMassimiliano Rak, Valentina Casola, Nicola Mazzocca, Emilio Pasquale Mancini, Umberto Villano. 144-153 [doi]
- Verification method of network simulation for pervasive environmentsKyuhyung Cho, Jongsung Lee, Jongin Lim, Jongsub Moon. 155-161 [doi]
- A secure and efficient key management scheme for wireless sensor networksYong Ho Kim, Hwaseong Lee, Dong-Hoon Lee. 162-167 [doi]
- A model for usage control in GRID systemsFabio Martinelli, Paolo Mori. 169-175 [doi]
- Intrusion Detection and tolerance in Grid-based applicationsJun Wang, Luigi Lo Iacono. 177-185 [doi]
- Secure token passing at application levelAugusto Ciuffoletti. 187-192 [doi]
- Gaining users' trust by publishing failure probabilitiesDominic Battré, Karim Djemame, Odej Kao, Kerstin Voß. 193-198 [doi]
- Platform to enforce multiple access control policy in grid hosting environmentLeonardo Mattes, Leonardo C. Militelli, João Antonio Zuffo. 199-205 [doi]
- Design patterns for secure virtual organization management architectureAngelo Gaeta, Matteo Gaeta, Alan Smith, Ivan Djordjevic, Theo Dimitrakos, Maurizio Colombo, Sergio Miranda. 207-216 [doi]
- An analysis of the chinese wall pattern for guaranteeing confidentiality in grid-based virtual organisationsGautier Dallons, Philippe Massonet, Jean-François Molderez, Christophe Ponsard, Alvaro Arenas. 217-222 [doi]
- OpenFire: Using deception to reduce network attacksKevin Borders, Laura Falk, Atul Prakash. 224-233 [doi]
- Modeling and detection of complex attacksSeyit Ahmet Çamtepe, Bülent Yener. 234-243 [doi]
- Intrusion detection technology based on CEGA-SVMYuxin Wei, Muqing Wu. 244-249 [doi]
- Misleading and defeating importance-scanning malware propagationGuofei Gu, Zesheng Chen, Phillip A. Porras, Wenke Lee. 250-259 [doi]
- Parameterizing access control for heterogeneous peer-to-peer applicationsAshish Gehani, Surendar Chandra. 269-278 [doi]
- Securing pseudo identities in an anonymous peer-to-peer file-sharing networkTom Chothia. 279-282 [doi]
- Using recurring costs for reputation management in peer-to-peer streaming systemsMichael Rossberg, Guenter Schaefer, Thorsten Strufe. 283-292 [doi]
- A feedback reputation mechanism to secure the optimized link state routing protocolJoão P. Vilela, João Barros. 294-303 [doi]
- Enhancing frequency-based wormhole attack detection with novel jitter waveformsMaria Gorlatova, Marc Kelly, Ramiro Liscano, Peter C. Mason. 304-309 [doi]
- Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approachXiaoxin Wu, David K. Y. Yau. 310-319 [doi]
- Securing Personal Network clustersAssed Jehangir, Sonia M. Heemstra de Groot. 320-329 [doi]
- Implications of radio fingerprinting on the security of sensor networksKasper Bonne Rasmussen, Srdjan Capkun. 331-340 [doi]
- SET: Detecting node clones in sensor networksHeesook Choi, Sencun Zhu, Thomas F. La Porta. 341-350 [doi]
- RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networksClaude Castelluccia, Angelo Spognardi. 351-360 [doi]
- Deception framework for sensor networksRuiyi Zhang, Johnson P. Thomas, Venkata Manoj Mulpuru. 361-369 [doi]
- An assessment of VoIP covert channel threatsTakehiro Takahashi, Wenke Lee. 371-380 [doi]
- Detecting bogus BGP route information: Going beyond prefix hijackingJian Qiu, Lixin Gao, Supranamaya Ranjan, Antonio Nucci. 381-390 [doi]
- Securing network location awareness with authenticated DHCPTuomas Aura, Michael Roe, Steven J. Murdoch. 391-402 [doi]
- Global interoperability of national security and emergency preparedness (NS/EP) telecommunications servicesFrank J. Suraci, Arye R. Ephrath, John R. Wullert. 403-410 [doi]
- Detecting worms via mining dynamic program executionXun Wang, Wei Yu, Adam C. Champion, Xinwen Fu, Dong Xuan. 412-421 [doi]
- Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETsAhren Studer, Mark Luk, Adrian Perrig. 422-432 [doi]
- PWC: A proactive worm containment solution for enterprise networksYoon-chan Jhi, Peng Liu 0005, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis. 433-442 [doi]
- Secure crash reporting in vehicular Ad hoc networksSumair Ur Rahman, Urs Hengartner. 443-452 [doi]
- A layout-similarity-based approach for detecting phishing pagesAngelo P. E. Rosiello, Engin Kirda, Christopher Kruegel, Fabrizio Ferrandi. 454-463 [doi]
- Simple cross-site attack preventionFlorian Kerschbaum. 464-472 [doi]
- Simple Authentication for the WebTimothy W. van der Horst, Kent E. Seamons. 473-482 [doi]
- Secure lightweight tunnel for monitoring transport containersJens Ove Lauf, Harald Sauff. 484-493 [doi]
- Sybil attack detection in a hierarchical sensor networkJian Yin, Sanjay Kumar Madria. 494-503 [doi]
- Anonymity and security in delay tolerant networksAniket Kate, Gregory M. Zaverucha, Urs Hengartner. 504-513 [doi]
- Breaking EMAPMihály Bárász, Balazs Boros, Péter Ligeti, Krisztina Lója, Daniel A. Nagy. 514-517 [doi]
- The Host Identity Protocol (HIP): Bringing mobility, multi- homing, and baseline security togetherPekka Nikander. 518-519 [doi]
- Evolution of networking: Current problems and future directionsPekka Nikander. 518 [doi]
- A model for usage control in GRID systemsFabio Martinelli. 520 [doi]
- Aggregation of attributes from different authoritiesDavid Chadwick. 521 [doi]