Abstract is missing.
- e-Business Challenges and Directions: Important Themes from the First ICE-B WorkshopDavid A. Marca, Rebecca Bulander, Cornelia Kruslin, Boris Shishkov, Marten van Sinderen. 3-35 [doi]
- Static Analysis of Routing and Firewall Policy ConfigurationsMiroslav Svéda, Ondrej Rysavý, Gayan de Silva, Petr Matousek, Jaroslav Ráb. 39-53 [doi]
- Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor NetworksBayrem Triki, Slim Rekhis, Noureddine Boudriga. 54-70 [doi]
- The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSAManuel Koschuch, Matthias Hudler, Michael Krüger. 71-83 [doi]
- Mobile Applications Middleware for File SwappingMario A. Gomez-Rodriguez, Victor Jesús Sosa-Sosa, Ivan López-Arévalo. 84-94 [doi]
- Optimization of a Handwriting Recognition Algorithm for a Mobile Enterprise Health Information System on the Basis of Real-Life Usability ResearchAndreas Holzinger, Martin Schlögl, Bernhard Peischl, Matjaz Debevc. 97-111 [doi]
- A Social Location-Based Emergency Service to Eliminate the Bystander EffectAndreas Geyer-Schulz, Michael Ovelgönne, Andreas C. Sonnenbichler. 112-130 [doi]
- Converged Optical Networks for Multimedia Distribution and Data Services in Hospitality EnvironmentsIñigo Artundo, David García-Roger, Beatriz Ortega. 133-144 [doi]
- Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang. 147-157 [doi]
- Modelling Uncertain and Time-Dependent Security Labels in MLS SystemsJohn A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget. 158-171 [doi]
- Sum Aggregation in Sensor Networks While Preserving Confidentiality and IntegrityKeith B. Frikken, Yihua Zhang. 172-187 [doi]
- Stream Cipher-Based Hash Function and Its SecurityYuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka. 188-202 [doi]
- Flexible Anonymous Subscription SchemesMaría Isabel González Vasco, Somayeh Heidarvand, Jorge L. Villar. 203-219 [doi]
- Proxiable Designated Verifier SignatureMebae Ushida, Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta. 220-232 [doi]
- Adaptive and Composable Non-interactive String-Commitment ProtocolsHuafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai. 233-242 [doi]
- Dynamic Adaptation of Security and QoS in Energy-Harvesting Sensors NodesAntonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante. 243-258 [doi]
- Threshold Discernible Ring SignaturesSwarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan. 259-273 [doi]
- Universally Composable Non-committing Encryptions in the Presence of Adaptive AdversariesHuafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai. 274-288 [doi]
- Selectively Traceable Anonymous and Unlinkable Token-Based TransactionsDaniel Slamanig, Stefan Rass. 289-303 [doi]
- An Encryption Scheme for a Secure Policy UpdatingLuan Ibraimi, Muhammad Asim, Milan Petkovic. 304-318 [doi]
- Machine Learning for the Detection of Spam in Twitter NetworksAlex Hai Wang. 319-333 [doi]
- Deformable Multi-object Tracking Using Full Pixel Matching of ImageHisato Aota, Kazuhiro Ota, Yuichi Yaguchi, Ryuichi Oka. 337-349 [doi]
- A Multi-sensor System for Monitoring the Performance of Elite SwimmersTanya Le Sage, Axel Bindel, Paul P. Conway, Laura Justham, Siân Slawson, James Webster, Andrew A. West. 350-362 [doi]
- Maximum a Posteriori Decoding of Arithmetic Codes in Joint Source-Channel CodingTrevor Spiteri, Victor Buttigieg. 363-377 [doi]
- An Ensemble Approach to Improve Microaneurysm Candidate ExtractionBálint Antal, István Lázár, András Hajdu. 378-391 [doi]
- Modulation-Mode Assignment for SVD-Aided and BICM-Assisted Downlink Multiuser MIMO Transmission SchemesAndreas Ahrens, César Benavente-Peces. 395-409 [doi]
- Evaluation of the Performance of Polarization Diversity Estimated from Measurements at One PolarizationIñigo Cuiñas, Manuel García Sánchez. 410-423 [doi]
- Using the OTS/CafeOBJ Method to Formally Specify and Verify the Open Mobile Alliance License Choice AlgorithmNikolaos Triantafyllou, Iakovos Ouranos, Petros S. Stefaneas, Panayiotis Frangos. 424-438 [doi]
- Extended Field Performance Evaluation of a Gbps FSO LinkJosé A. R. Pacheco de Carvalho, Nuno Marques, Hugo Veiga, C. F. Ribeiro Pacheco, Antonio D. Reis. 439-446 [doi]