Abstract is missing.
- Finding Peer-to-Peer File-Sharing Using Coarse Network BehaviorsMichael P. Collins, Michael K. Reiter. 1-17 [doi]
- Timing Analysis in Low-Latency Mix Networks: Attacks and DefensesVitaly Shmatikov, Ming-Hsiu Wang. 18-33 [doi]
- TrustedPals: Secure Multiparty Computation Implemented with Smart CardsMilan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan. 34-48 [doi]
- Private Information Retrieval Using Trusted HardwareShuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao. 49-64 [doi]
- Bridging the Gap Between Inter-communication Boundary and Internal Trusted ComponentsYuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama. 65-80 [doi]
- License Transfer in OMA-DRMCheun Ngen Chong, Sorin M. Iacob, Paul Koster, Javier Montaner, René van Buuren. 81-96 [doi]
- Enhanced Security Architecture for Music Distribution on MobileAbdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau. 97-109 [doi]
- A Formal Model of Access Control for Mobile Interactive DevicesFrédéric Besson, Guillaume Dufay, Thomas P. Jensen. 110-126 [doi]
- Discretionary Capability ConfinementPhilip W. L. Fong. 127-144 [doi]
- Minimal Threshold ClosureXibin Zhao, Kwok-Yan Lam, Guimin Luo, Siu Leung Chung, Ming Gu. 145-155 [doi]
- Reducing the Dependence of SPKI/SDSI on PKIHao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine. 156-173 [doi]
- Delegation in Role-Based Access ControlJason Crampton, Hemanth Khambhammettu. 174-191 [doi]
- Applying a Security Requirements Engineering ProcessDaniel Mellado, Eduardo Fernández-Medina, Mario Piattini. 192-206 [doi]
- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database SystemHai Wang, Peng Liu. 207-224 [doi]
- A Formal Framework for Confidentiality-Preserving RefinementThomas Santen. 225-242 [doi]
- Timing-Sensitive Information Flow Analysis for Synchronous SystemsBoris Köpf, David A. Basin. 243-262 [doi]
- HBAC: A Model for History-Based Access Control and Its Model CheckingJing Wang, Yoshiaki Takata, Hiroyuki Seki. 263-278 [doi]
- From Coupling Relations to Mated Invariants for Checking Information FlowDavid A. Naumann. 279-296 [doi]
- A Linear Logic of Authorization and KnowledgeDeepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter. 297-312 [doi]
- Prêt à Voter with Re-encryption MixesPeter Y. A. Ryan, Steve A. Schneider. 313-326 [doi]
- Secure Key-Updating for Lazy RevocationMichael Backes, Christian Cachin, Alina Oprea. 327-346 [doi]
- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File SystemsMudhakar Srivatsa, Ling Liu. 347-361 [doi]
- Cryptographically Sound Security Proofs for Basic and Public-Key KerberosMichael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay. 362-383 [doi]
- Deriving Secrecy in Key Establishment ProtocolsDusko Pavlovic, Catherine Meadows. 384-403 [doi]
- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with HashesMichael Backes, Birgit Pfitzmann, Michael Waidner. 404-423 [doi]
- Conditional Reactive SimulatabilityMichael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters. 424-443 [doi]
- SessionSafe: Implementing XSS Immune Session HandlingMartin Johns. 444-460 [doi]
- Policy-Driven Memory Protection for Reconfigurable HardwareTed Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner. 461-478 [doi]
- Privacy-Preserving Queries on Encrypted DataZhiqiang Yang, Sheng Zhong, Rebecca N. Wright. 479-495 [doi]
- Analysis of Policy Anomalies on Distributed Network Security SetupsJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia. 496-511 [doi]
- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS AttacksGabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro. 512-526 [doi]
- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection SystemsGuofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric. 527-546 [doi]