12 | -- | 14 | Steven J. Vaughan-Nichols. Tempest over Web-Authoring Tools |
15 | -- | 18 | Maria-Angeles Grado-Caffaro, Martin Grado-Caffaro. The Challenges that XML Faces |
25 | -- | 30 | Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos. Search Engines as a Security Threat |
32 | -- | 39 | Lixin Tao. Shifting Paradigms with the Application Service Provider Model |
40 | -- | 41 | William A. Arbaugh, Leendert van Doorn. Guest Editors Introduction: Embedded Security: Challenges and Concerns |
42 | -- | 47 | C. Brendan S. Traw. Protecting Digital Content within the Home |
48 | -- | 49 | Dan S. Wallach. Copy Protection Technology is Doomed |
50 | -- | 56 | Peter Bergstrom, Kevin Driscoll, John Kimball. Making Home Automation Communications Secure |
57 | -- | 66 | Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, Steve Weingart. Building the IBM 4758 Secure Coprocessor |
67 | -- | 75 | Mike Bond, Ross J. Anderson. API-Level Attacks on Embedded Systems |
108 | -- | 110 | Sergei Gerasenko, Abhijit Joshi, Srinivas Rayaprolu, Kovendhan Ponnavaikko, Dharma P. Agrawal. Beacon Signals: What, Why, How, and Where? |
111 | -- | 112 | Grantley Day. Online Games: Crafting Persistent-State Worlds |
113 | -- | 115 | Leonard J. Bass, Bonnie E. John. Supporting Usability Through Software Architecture |
116 | -- | 117 | Carl Cargill. Why Are We Doing This? |
118 | -- | 120 | W. Neville Holmes. The Profession s Future Lies in Its Past |