Abstract is missing.
- Du-Vote: Remote Electronic Voting with Untrusted ComputersMark Ryan, Gurchetan S. Grewal, Liqun Chen. 4 [doi]
- Extraction of Insider Attack Scenarios from a Formal Information System ModelingAmira Radhouani, Akram Idani, Yves Ledru, Narjes Ben Rajeb. 5-19 [doi]
- Traffic Analysis of Web BrowsersSami Zhioua, Mahjoub Langar. 20-33 [doi]
- Secrecy by Witness FunctionsJaouhar Fattahi, Mohamed Mejri, Hanane Houmani. 34-52 [doi]
- Formal Enforcement of Security Policies on Choreographed ServicesMahjoub Langar, Karim Dahmani. 53-67 [doi]
- A Timestamping Scheme with Eternal Security in the Bounded Storage ModelAssia Ben Shil, Kaouthar Blibech. 68-79 [doi]