Abstract is missing.
- Slid Pairs in the Initialisation of the A5/1 Stream CipherAli Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong. 3-12 [doi]
- Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without PairingsMaryam Rajabzadeh Asaar, Ali Vardasbi, Mahmoud Salmasizadeh. 13-25 [doi]
- Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption SchemeRussell Paulet, Xun Yi. 25-30 [doi]
- An Overview of the Parallax BattleMind v1.5 for Computer Network DefenceDuncan A. Grove, Alex Murray, Damien Gerhardy, Benjamin Turnbull, Troy Tobin, Christopher Moir. 31-38 [doi]
- Digital Camcorder ForensicsAswami Ariffin, Kim-Kwang Raymond Choo, Jill Slay. 39-48 [doi]
- Anatomy of Drive-by Download AttackVan Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk. 49-58 [doi]
- Evaluation of Fingerprinting Techniques and a Windows-based Dynamic HoneypotHadi Mohammadzadeh, Masood Mansoori, Ian Welch. 59-66 [doi]
- Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System SecurityThomas H. Morris, Rayford B. Vaughn, Elena Sitnikova. 67-76 [doi]
- A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture)Tansu Alpcan. 77-78 [doi]