Abstract is missing.
- Analysis of Revocation Strategies for Anonymous Idemix CredentialsJorn Lapon, Markulf Kohlweiss, Bart De Decker, Vincent Naessens. 3-17 [doi]
- A Secure Key Management Framework for Heterogeneous Wireless Sensor NetworksMahdi R. Alaghband, Mohammad Reza Aref. 18-31 [doi]
- Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version)Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider 0003. 32-44 [doi]
- Implementation Aspects of Anonymous Credential Systems for Mobile Trusted PlatformsKurt Dietrich, Johannes Winter, Granit Luzhnica, Siegfried Podesser. 45-58 [doi]
- Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging FeatureRonny Merkel, Jana Dittmann, Claus Vielhauer. 59-71 [doi]
- Two-Factor Biometric Recognition with Integrated Tamper-Protection WatermarkingReinhard Huber, Herbert Stögner, Andreas Uhl. 72-84 [doi]
- Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic HandwritingKarl Kümmel, Tobias Scheidat, Christian Arndt, Claus Vielhauer. 85-93 [doi]
- Dynamic Software Birthmark for Java Based on Heap Memory AnalysisPatrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu. 94-107 [doi]
- A Secure Perceptual Hash Algorithm for Image Content AuthenticationLi Weng, Bart Preneel. 108-121 [doi]
- Low-Attention Forwarding for Mobile Network Covert ChannelsSteffen Wendzel, Jörg Keller. 122-133 [doi]
- Cryptanalysis of a SIP Authentication SchemeFuwen Liu, Hartmut König. 134-143 [doi]
- Mapping between Classical Risk Management and Game Theoretical ApproachesLisa Rajbhandari, Einar Snekkenes. 147-154 [doi]
- Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?Konstantinos Rantos. 155-162 [doi]
- A Generic Architecture for Integrating Health Monitoring and Advanced Care ProvisioningKoen Decroix, Milica Milutinovic, Bart De Decker, Vincent Naessens. 163-170 [doi]
- A Modular Test Platform for Evaluation of Security Protocols in NFC ApplicationsGeoffrey Ottoy, Jeroen Martens, Nick Saeys, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere, Tom Hamelinckx. 171-177 [doi]
- GPU-Assisted AES Encryption Using GCMGeorg Schönberger, Jürgen Fuß. 178-185 [doi]
- Radon Transform-Based Secure Image HashingDung Q. Nguyen, Li Weng, Bart Preneel. 186-193 [doi]
- On Detecting Abrupt Changes in Network Entropy Time SeriesPhilipp Winter, Harald Lampesberger, Markus Zeilinger, Eckehard Hermann. 194-205 [doi]
- Motif-Based Attack Detection in Network Communication GraphsKrzysztof Juszczyszyn, Grzegorz Kolaczek. 206-213 [doi]
- Secure Negotiation for Manual Authentication ProtocolsMilica Milutinovic, Roel Peeters, Bart De Decker. 214-221 [doi]
- A Secure One-Way Authentication Protocol in IMS ContextMohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul. 222-231 [doi]
- High Capacity FFT-Based Audio WatermarkingMehdi Fallahpour, David Megías. 235-237 [doi]
- Efficient Prevention of Credit Card Leakage from Enterprise NetworksMatthew Hall, Reinoud Koornstra, Miranda Mowbray. 238-240 [doi]
- Security Warnings for Children's Smart Phones: A First Design ApproachJana Fruth, Ronny Merkel, Jana Dittmann. 241-243 [doi]
- Ciphertext-Policy Attribute-Based Broadcast Encryption SchemeMuhammad Asim, Luan Ibraimi, Milan Petkovic. 244-246 [doi]
- Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract)Daniel Slamanig. 247-249 [doi]
- Mobile Identity ManagementJaap-Henk Hoepman. 253 [doi]
- Who Needs Facebook Anyway - Privacy and Sociality in Social Network SitesRonald E. Leenes. 254 [doi]
- From Protecting a System to Protecting a Global EcosystemMoti Yung. 255 [doi]