1 | -- | 2 | Ilsun You. Editorial |
3 | -- | 13 | Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai. Efficient variant of Rainbow using sparse secret keys |
14 | -- | 29 | Igor V. Kotenko, Elena Doynikova. Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing |
30 | -- | 43 | Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif. A Model-Driven Approach to Noninterference |
44 | -- | 62 | Christoph Hochreiner, Peter FrÃ1/4hwirt, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl. Genie in a Model? Why Model Driven Security will not secure your Web Application |
63 | -- | 78 | Tomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama. Evaluating data utility of privacy-preserving pseudonymized location datasets |
79 | -- | 93 | Raihan Ul Islam, Mischa Schmidt, Hans-Joerg Kolbe, Karl Andersson. Secure and Scalable Multimedia Sharing between Smart Homes |