Abstract is missing.
- Developing Secure, Trusted and Auditable Services for e-Business: An Autonomic Computing ApproachAhmed Patel. 1-10 [doi]
- A Mechanism for Trust Sustainability Among Trusted Computing PlatformsZheng Yan, Piotr Cofta. 11-19 [doi]
- Enabling Trust-Awareness in Naming ServicesNicola Mezzetti. 20-29 [doi]
- Virtual Trust in Distributed SystemsSemir Daskapan, Ana Cristina Costa, Willem G. Vree, Amr Ali Eldin. 30-39 [doi]
- Modelling Trust Relationships in Distributed EnvironmentsWeiliang Zhao, Vijay Varadharajan, George Bryan. 40-49 [doi]
- Dynamically Changing Trust Structure in Capability Based Access Control SystemsSandra Wortmann, Barbara Sprick, Christoph Kobusch. 50-59 [doi]
- On the Design of a New Trust Model for Mobile Agent SecurityChing Lin, Vijay Varadharajan, Yan Wang, Yi Mu. 60-69 [doi]
- Balancing Privacy and Trust in Electronic MarketplacesSandra Steinbrecher. 70-79 [doi]
- Reducing Server Trust in Private Proxy AuctionsGiovanni Di Crescenzo, Javier Herranz, Germán Sáez. 80-89 [doi]
- Secure Ad-Hoc mBusiness: EnhancingWindowsCE SecurityFlorina Almenárez Mendoza, Daniel Diaz, Andrés Marín López. 90-99 [doi]
- Role-Based Privilege Management Using Attribute Certificates and DelegationGail-Joon Ahn, Dongwan Shin, Longhua Zhang. 100-109 [doi]
- Consent as a Threat. A Critical Approach to Privacy Negotiation in e-Commerce PracticesA. Daniel Oliver-Lalana. 110-119 [doi]
- Dealing with Privacy Obligations: Important Aspects and Technical ApproachesMarco Casassa Mont. 120-131 [doi]
- Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital SignaturesMing Yao, Matthew Henricksen, Ernest Foo, Ed Dawson. 132-141 [doi]
- Privacy Preserving Data Generation for Database Application Performance TestingYongge Wang, Xintao Wu, Yuliang Zheng. 142-151 [doi]
- An Efficient Mixnet-Based Voting Scheme Providing Receipt-FreenessRiza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson. 152-161 [doi]
- Trust in Public Administration e-Transactions: e-Voting in the UK.Alexandros Xenakis, Ann Macintosh. 162-171 [doi]
- An Unbalanced Protocol for Group Key ExchangeJavier Herranz, Jorge Luis Villar. 172-180 [doi]
- Certified E-Mail with Temporal Authentication: An Improved Optimistic ProtocolClemente Galdi, Raffaella Giordano. 181-190 [doi]
- Efficient Password-Based Group Key ExchangeSu-Mi Lee, Jung Yeon Hwang, Dong-Hoon Lee. 191-199 [doi]
- Optimality in Asynchronous Contract Signing ProtocolsJosep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger. 200-208 [doi]
- Development of Visible Anti-copy PatternsJong-Weon Kim, Kyu-Tae Kim, Jung-Soo Lee, Jong-Uk Choi. 209-218 [doi]
- Holographic ImageWatermarking for Secure Content.Kyu-Tae Kim, Jong-Weon Kim, Jung-Soo Lee, Jong-Uk Choi. 219-231 [doi]
- Hybrid Fingerprint Matching on Programmable Smart CardsTommaso Cucinotta, Riccardo Brigo, Marco Di Natale. 232-241 [doi]
- Protecting ASF Movie on VODJihyun Park, Jeong Hyun Kim, Kisong Yoon. 242-250 [doi]
- DiffSig: Differentiated Digital Signature for Real-Time Multicast Packet FlowsNamhi Kang, Christoph Ruland. 251-260 [doi]
- Large-Scale Pay-As-You-Watch for Unicast and Multicast CommunicationsAntoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer. 261-268 [doi]
- Reducing the Communication Overhead of an Offline Revocation DictionaryJose L. Muñoz, Jordi Forné, Oscar Esparza, Josep Pegueroles, Esteve Pallarès. 269-278 [doi]
- Breaking Down Architectural Gaps in Smart-Card Middleware DesignTommaso Cucinotta, Marco Di Natale, David Corcoran. 279-288 [doi]
- On the Security of the Lee-Hwang Group-Oriented Undeniable Signature SchemesGuilin Wang, Jianying Zhou, Robert H. Deng. 289-298 [doi]