Abstract is missing.
- Secret Handshake Scheme with Request-Based-RevealingYutaka Kawai, Noboru Kunihiro. 1-16 [doi]
- Password-Based SignaturesKristian Gjøsteen, Øystein Thuen. 17-33 [doi]
- Isolating Partial Information of Indistinguishable EncryptionsJean Lancrenon, Roland Gillard. 34-48 [doi]
- A Universal Client-Based Identity Management ToolHaitham S. Al-Sinani, Chris J. Mitchell. 49-74 [doi]
- Design and Evaluation of a Privacy-Preserving Architecture for Vehicle-to-Grid InteractionMark Stegelmann, Dogan Kesdogan. 75-90 [doi]
- Insider Attacks and Privacy of RFID ProtocolsTon van Deursen, Sasa Radomirovic. 91-105 [doi]
- Cell-Based RoadpricingFlavio D. Garcia, Eric R. Verheul, Bart Jacobs. 106-122 [doi]
- Ballot Aggregation and Mixnet Based Open-Audit Elections - (Extended Abstract)Olivier Pereira. 123-127 [doi]
- PKI as Part of an Integrated Risk Management Strategy for Web SecurityPeter Gutmann. 128-146 [doi]
- A PKI-Based Mobile Banking DemonstratorGauthier Van Damme, Nicolas Luyckx, Karel Wouters. 147-158 [doi]
- Certification Validation: Back to the PastMoez Ben MBarka, Julien P. Stern. 159-175 [doi]
- A Hijacker's Guide to the LPC BusJohannes Winter, Kurt Dietrich. 176-193 [doi]
- Secure Event Logging in Sensor NetworksAn Braeken, Antonio De La Piedro, Karel Wouters. 194-208 [doi]