4 | -- | 5 | Fred B. Schneider. Trusted Computing in Context |
7 | -- | 10 | Brandi Ortega. News Briefs |
11 | -- | 14 | Gary McGraw. Silver Bullet Speaks with Dorothy Denning |
15 | -- | 16 | Ivan Arce. A Surprise Party (on Your Computer)? |
17 | -- | 25 | Luca Carettoni, Claudio Merloni, Stefano Zanero. Studying Bluetooth Malware Propagation: The BlueBag Project |
26 | -- | 31 | Vanessa Gratzer, David Naccache. Alien vs. Quine |
32 | -- | 39 | Carsten Willems, Thorsten Holz, Felix C. Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox |
40 | -- | 45 | Robert Lyda, James Hamrock. Using Entropy Analysis to Find Encrypted and Packed Malware |
46 | -- | 54 | Danilo Bruschi, Lorenzo Martignoni, Mattia Monga. Code Normalization for Self-Mutating Malware |
55 | -- | 63 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino. Trust Negotiation in Identity Management |
64 | -- | 67 | Marianthi Theoharidou, Dimitris Gritzalis. Common Body of Knowledge for Information Security |
68 | -- | 71 | Keye Martin. Secure Communication without Encryption? |
72 | -- | 75 | E. Michael Power, Jonathan Gilhen, Roland L. Trope. Setting Boundaries at Borders: Reconciling Laptop Searches and Privacy |
76 | -- | 79 | Patrick P. Tsang. When Cryptographers Turn Lead into Gold |
80 | -- | 84 | Apu Kapadia. A Case (Study) For Usability in Secure Email Communication |
85 | -- | 87 | Michael Lesk. South Korea s Way to the Future |
88 | -- | 91 | Elizabeth A. Nichols, Gunnar Peterson. A Metrics Framework to Drive Application Security Improvement |
92 | -- | 96 | Ramaswamy Chandramouli, Philip Lee. Infrastructure Standards for Smart ID Card Deployment |