Abstract is missing.
- Representing ASN.1 in ZAntonio Cerone. 9-16 [doi]
- Flexible Enterprise Access Control with Object-oriented View SpecificationMark Evered. 17-24 [doi]
- Electronic Information Security DocumentationPeggy P. K. Fung, Lam-for Kwok, Dennis Longley. 25-31 [doi]
- A Secure Workflow ModelPatrick C. K. Hung, Kamalakar Karlapalem. 33-41 [doi]
- Security in Mobile Communications: Challenges and OpportunitiesAudun Jøsang, Gunnar Sanderud. 43-48 [doi]
- Digital Rights Management for Content DistributionQiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard. 49-58 [doi]
- Formalising Key-Distribution in the Presence of Trust using Object-ZBenjamin W. Long. 59-66 [doi]
- A Secure Pervasive EnvironmentPatrick G. McLean. 67-75 [doi]
- Five Sealed-bid Auction ModelsKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan. 77-86 [doi]
- Implementing Role Based Access Control for Federated Information Systems on the WebKerry L. Taylor, James Murty. 87-95 [doi]
- Provably Secure Key Exchange: An Engineering ApproachYiu Shing Terry Tin, Colin Boyd, Juanma González Nieto. 97-104 [doi]
- A Secure Mental Poker Protocol Over The InternetWeiliang Zhao, Vijay Varadharajan, Yi Mu. 105-109 [doi]
- Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing.Philipp Amann, Gerald Quirchmayr. 119-131 [doi]
- Middleware for Context Sensitive Mobile ApplicationsKenneth A. Hawick, Heath A. James. 133-141 [doi]
- Location Management in Pervasive SystemsJadwiga Indulska, Peter Sutton. 143-151 [doi]
- Location History in a Low-cost Context Awareness EnvironmentTeddy Mantoro, Chris Johnson. 153-158 [doi]
- A Survey of Research on Context-Aware HomesSven Meyer, Andry Rakotonirainy. 159-168 [doi]
- Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoomJason B. Scholz, Mark W. Grigg, Paul Prekop, Mark Burnett. 169-176 [doi]
- Developing a Location Based Tourist Guide ApplicationTodd Simcock, Stephen Peter Hillenbrand, Bruce H. Thomas. 177-183 [doi]
- Applying Enterprise Architectures and Technology to the Embedded Devices DomainKen Taylor, Doug Palmer. 185-190 [doi]