Abstract is missing.
- Foundation for Systems SecurityClark Thomborson. 3
- Faster Group Operations on Elliptic CurvesHüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson. 7-19 [doi]
- Strong Designated Verifier Signature in a Multi-user SettingM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto. 21-31 [doi]
- Algebraic Analysis of LEXMuhammad Reza Z'aba, Håvard Raddum, Leonie Simpson, Ed Dawson, Matt Henricksen, Kenneth Koon-Ho Wong. 33-45 [doi]
- 2 CryptanalysisRouto Terada, Eduardo T. Ueda. 47-52 [doi]
- Slotted Packet Counting Attacks on Anonymity ProtocolsVolker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel. 53-59 [doi]
- Towards a Decision Model Based on Trust and Security Risk ManagementBaptiste Alcalde, Eric Dubois 0001, Sjouke Mauw, Nicolas Mayer, Sasa Radomirovic. 61-69 [doi]
- Passwords and PerceptionsGilbert Notoatmodjo, Clark Thomborson. 71-78 [doi]
- Preliminary Security Specification for New Zealand's igovt SystemYu-Cheng Tu, Clark Thomborson. 79-88 [doi]
- Proposal for Effective Information Flow Control Model for Sharing and Protecting Sensitive InformationMasato Arai, Hidehiko Tanaka. 89-98 [doi]
- Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC)Vicky Liu, Luis Franco, William J. Caelli, Lauren May, Tony Sahama. 99-108 [doi]