Abstract is missing.
- Partial Model Checking for the Verification and Synthesis of Secure Service CompositionsFabio Martinelli, Ilaria Matteucci. 1-11 [doi]
- Efficient and Perfectly Unlinkable Sanitizable Signatures without Group SignaturesChristina Brzuska, Henrich Christopher Pöhls, Kai Samelin. 12-30 [doi]
- Revocation and Non-repudiation: When the First Destroys the LatterJohannes Braun 0001, Franziskus Kiefer, Andreas Hülsing. 31-46 [doi]
- New Results for the Practical Use of Range ProofsSébastien Canard, Iwen Coisel, Amandine Jambert, Jacques Traoré. 47-64 [doi]
- STUNT: A Simple, Transparent, User-Centered Network of TrustKlaus Potzmader, Johannes Winter, Daniel Hein. 65-82 [doi]
- What Public Keys Can Do for 3-Party, Password-Authenticated Key ExchangeJean Lancrenon. 83-101 [doi]
- Towards a More Secure and Scalable Verifying PKI of eMRTDNicolas Buchmann, Harald Baier. 102-118 [doi]
- Mutual Restricted IdentificationLucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski, Lukasz Krzywiecki. 119-133 [doi]
- Trust Views for the Web PKIJohannes Braun 0001, Florian Volk, Johannes Buchmann, Max Mühlhäuser. 134-151 [doi]
- A User-Centric Digital Signature SchemeFelipe Carlos Werlang, Ricardo Felipe Custódio, Martín A. Gagliotti Vigil. 152-169 [doi]
- A Test-Bed for Intrusion Detection Systems Results Post-processingGeorgios P. Spathoulas, Sokratis K. Katsikas, Anastasios Charoulis. 170-183 [doi]
- Uncertainty in Intrusion Detection Signaling GamesIoanna Kantzavelou, Sokratis K. Katsikas. 184-203 [doi]