Abstract is missing.
- Duo-Onions and Hydra-Onions - Failure and Adversary Resistant Onion ProtocolsJan Iwanik, Marek Klonowski, Miroslaw Kutylowski. 1-15 [doi]
- Personal Attributes and Privacy - How to ensure that private attribute management is not subverted by dataminingHoward Chivers. 17-29 [doi]
- Local Management of Credits and Debits in Mobile Ad Hoc NetworksFabio Martinelli, Marinella Petrocchi, Anna Vaccarelli. 31-45 [doi]
- How Secure are Current Mobile Operating Systems?Tobias Murmann, Heiko Rossnagel. 47-58 [doi]
- An Overview of Security Issues and Techniques in Mobile AgentsMousa Alfalayleh, Ljiljana Brankovic. 59-78 [doi]
- A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key CryptographyKonstantinos Markantonakis, Keith Mayes. 79-95 [doi]
- Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile NetworksTimothy W. van der Horst, Tore Sundelin, Kent E. Seamons, Charles D. Knutson. 97-109 [doi]
- Weak Context Establishment Procedure for Mobility and Multi-Homing ManagementVesa Torvinen, Jukka Ylitalo. 111-123 [doi]
- A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural ComponentsLieven Desmet, Bart Jacobs 0002, Frank Piessens, Wouter Joosen. 125-130 [doi]
- Threat Modelling for Web Services Based Web ApplicationsLieven Desmet, Bart Jacobs, Frank Piessens, Wouter Joosen. 131-144 [doi]
- Threat Modelling for ASP.NET - Designing Secure ApplicationsRüidiger Grimm, Henrik Eichstädt. 145-158 [doi]
- Threat Modelling for SQL Servers - Designing a Secure Database in a Web ApplicationElisa Bertino, Danilo Bruschi, Stefano Franzoni, Igor Nai Fovino, Stefano Valtolina. 159-171 [doi]
- Threat Modelling for Active DirectoryDavid Chadwick. 173-182 [doi]
- Threat Modelling for Security Tokens in Web ApplicationsDanny De Cock, Karel Wouters, Dries Schellekens, Dave Singelée, Bart Preneel. 183-193 [doi]
- Analysis of the DVB Common Scrambling AlgorithmRalf-Philipp Weinmann, Kai Wirt. 195-207 [doi]
- An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao IntruderTheodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas. 209-221 [doi]
- Robust Visual Hashing Using JPEG 2000Roland Norcen, Andreas Uhl. 223-235 [doi]
- A System for End-to-End Authentication of Adaptive Multimedia ContentTakashi Suzuki, Zulfikar Ramzan, Hiroshi Fujimoto, Craig Gentry, Takehiro Nakayama, Ravi Jain. 237-249 [doi]
- Using SAML to Link the Globus Toolkit to the Permis Authorisation InfrastructureDavid W. Chadwick, Sassa Otenko, Von Welch. 251-261 [doi]
- Secure Role Based MessagingDavid W. Chadwick, Graeme Lunt, Gansen Zhao. 263-275 [doi]
- Five Non-Technical Pillars of Network Information Security ManagementElmarie Kritzinger, Sebastiaan H. von Solms. 277-287 [doi]