1 | -- | 0 | Adrian Waller, Gregorio Martínez Pérez, Félix Gómez Mármol. Editorial: Special issue on Identity Protection and Management |
2 | -- | 17 | Georgios Kambourakis. Anonymity and closely related terms in the cyberspace: An analysis by example |
18 | -- | 24 | Wen-Chung Kuo, Hong-Ji Wei, Jiin-Chiou Cheng. An efficient and secure anonymous mobility network authentication scheme |
25 | -- | 44 | Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss. Concepts and languages for privacy-preserving attribute-based authentication |
45 | -- | 60 | Younis A. Younis, Kashif Kifayat, Madjid Merabti. An access control model for cloud computing |
61 | -- | 77 | Sanna Suoranta, Kamran Manzoor, Asko Tontti, Joonas Ruuskanen, Tuomas Aura. Logout in single sign-on systems: Problems and solutions |
78 | -- | 87 | Xiaole Fang, Qianxue Wang, Christophe Guyeux, Jacques M. Bahi. FPGA acceleration of a pseudorandom number generator based on chaotic iterations |
88 | -- | 100 | Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini. On the privacy of private browsing - A forensic approach |