Abstract is missing.
- Current Topics in Security of Mobile Ad-hoc NETworksPino Caballero-Gil. 3
- A New Very Fast Stream Cipher : TpyEli Biham, Jennifer Seberry. 5
- Deploying Access Control in Distributed WorkflowSamiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens. 9-17 [doi]
- PULSE: a Pluggable User-space Linux Security Environment paperAlex Murray, Duncan A. Grove. 19-25 [doi]
- Commitment Issues in Delegation ProcessQuan Pham, Jason Reid, Adrian McCullagh, Ed Dawson. 27-38 [doi]
- ID-based One-pass Authenticated Key EstablishmentM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto. 39-46 [doi]
- Linear Cellular Automata as Discrete Models for Generating Cryptographic SequencesAmparo Fúster-Sabater, Pino Caballero-Gil. 47-52 [doi]
- Robust WYSIWYS: A Method for Ensuring that What You See Is What You SignAudun Jøsang, Bander AlFayyadh. 53-58 [doi]
- Mitigating Phishing with ID-based Online/Offline AuthenticationQiong Ren, Yi Mu, Willy Susilo. 59-64 [doi]
- An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security SystemsMohammed Al Zomai, Bander AlFayyadh, Audun Jøsang, Adrian McCullagh. 65-73 [doi]
- Formal Security Analysis of Australian E-passport ImplementationVijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang. 75-82 [doi]
- Layered Identity Infrastructure Model for Identity Meta SystemsSuriadi Suriadi, Ernest Foo, Rong Du. 83-92 [doi]
- Secure Data Aggregation in Wireless Sensor Network: a surveyHani Alzaid, Ernest Foo, Juan Manuel González Nieto. 93-105 [doi]
- Acimn: A protocol for Anonymous Communication In Multi hop wireless networksVolker Fusenig, Dagmara Spiewak, Thomas Engel. 107-114 [doi]
- Implementing the ISO/IEC 17799 standard in practice - experiences on audit phasesTimo Wiander. 115-119 [doi]