Abstract is missing.
- A Scalable Wireless Routing Protocol Secure against Route Truncation AttacksAmitabh Saxena, Ben Soh. 4-15 [doi]
- Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data FusionSaif Al-Kuwari, Stephen D. Wolthusen. 16-27 [doi]
- Throwing a MonkeyWrench into Web Attackers PlansArmin Büscher, Michael Meier, Ralf Benzmüller. 28-39 [doi]
- Security in OpenSocial-Instrumented Social Networking ServicesMatthias Häsel, Luigi Lo Iacono. 40-52 [doi]
- Security for XML Data BindingNils Gruschka, Luigi Lo Iacono. 53-63 [doi]
- Watermark Detection for Video Bookmarking Using Mobile Phone CameraPeter Meerwald, Andreas Uhl. 64-74 [doi]
- Watermark-Based Authentication and Key Exchange in Teleconferencing SystemsUlrich Rührmair, Stefan Katzenbeisser, Martin Steinebach, Sascha Zmudzinski. 75-80 [doi]
- Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-WalkingThomas Stütz, Andreas Uhl. 81-92 [doi]
- Statistical Detection of Malicious PE-Executables for Fast Offline AnalysisRonny Merkel, Tobias Hoppe, Christian Krätzer, Jana Dittmann. 93-105 [doi]
- A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)Nicolas Racz, Edgar Weippl, Andreas Seufert. 106-117 [doi]
- Business and IT Continuity BenchmarkingWolfgang Neudorfer, Louis Marinos, Ingrid Schaumüller-Bichl. 118-129 [doi]
- Peer-to-Peer VoIP Communications Using Anonymisation Overlay NetworksGe Zhang, Simone Fischer-Hübner. 130-141 [doi]
- SIP Proxies: New Reflectors in the InternetGe Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simone Fischer-Hübner. 142-153 [doi]
- Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement ProposalPatrick Battistello, Cyril Delétré. 154-165 [doi]
- Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based AuthenticationStefan Rass, David Schuller, Christian Kollmitzer. 166-177 [doi]
- Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data ReconstructionKarl Kümmel, Claus Vielhauer, Tobias Scheidat, Dirk Franke, Jana Dittmann. 178-190 [doi]
- Privacy Preserving Key Generation for Iris BiometricsChristian Rathgeb, Andreas Uhl. 191-200 [doi]
- Generalizations and Extensions of Redactable Signatures with Applications to Electronic HealthcareDaniel Slamanig, Stefan Rass. 201-213 [doi]
- Chosen-Ciphertext Secure Certificateless Proxy Re-EncryptionChul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee. 214-232 [doi]
- Detecting Hidden Encrypted VolumesChristopher Hargreaves, Howard Chivers. 233-244 [doi]
- Tor HTTP Usage and Information LeakageMarcus Huber, Martin Mulazzani, Edgar Weippl. 245-255 [doi]
- Secure Communication Using Identity Based EncryptionSebastian Roschke, Luan Ibraimi, Feng Cheng 0002, Christoph Meinel. 256-267 [doi]
- Anonymous Client Authentication for Transport Layer SecurityKurt Dietrich. 268-280 [doi]