Abstract is missing.
- A Survey of Voice over IP Security ResearchAngelos D. Keromytis. 1-17 [doi]
- Security for a Smarter PlanetNataraj Nagaratnam. 18 [doi]
- The WOMBAT Attack Attribution Method: Some ResultsMarc Dacier, Van-Hau Pham, Olivier Thonnard. 19-37 [doi]
- Biometrics and SecurityVenu Govindaraju. 38 [doi]
- Remote Electronic Voting with Revocable AnonymityMatt Smart, Eike Ritter. 39-54 [doi]
- On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare ProfessionalsMassimiliano Masi, Rosario Pugliese, Francesco Tiezzi. 55-70 [doi]
- On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-LookupBing Liang, Yingjiu Li, Changshe Ma, Tieyan Li, Robert H. Deng. 71-85 [doi]
- Biometric Identification over Encrypted Data Made FeasibleMichael Adjedj, Julien Bringer, Hervé Chabanne, Bruno Kindarji. 86-100 [doi]
- Correcting and Improving the NP Proof for Cryptographic Protocol InsecurityZhiyao Liang, Rakesh M. Verma. 101-116 [doi]
- Formal Verification of Security Policy Implementations in Enterprise NetworksP. Bera, S. K. Ghosh, Pallab Dasgupta. 117-131 [doi]
- Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth PuzzlesMichael K. Reiter, Vyas Sekar, Chad Spensky, Zhenghao Zhang. 132-147 [doi]
- An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information ProductsZhen Zhang, K. H. (Kane) Kim, Myeong-Ho Kang, Tianran Zhou, Byung-Ho Chung, Shin-Hyo Kim, Seok-Joon Lee. 148-162 [doi]
- DROP: Detecting Return-Oriented Programming Malicious CodePing Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie. 163-177 [doi]
- A Framework for Behavior-Based Malware Analysis in the CloudLorenzo Martignoni, Roberto Paleari, Danilo Bruschi. 178-192 [doi]
- BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETsVanessa FrÃas-MartÃnez, Salvatore J. Stolfo, Angelos D. Keromytis. 193-207 [doi]
- Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious InsidersJonathan White, Brajendra Panda. 208-221 [doi]
- Database Relation Watermarking Resilient against Secondary Watermarking AttacksGaurav Gupta, Josef Pieprzyk. 222-236 [doi]
- A Robust Damage Assessment Model for Corrupted Database SystemsGe Fu, Hong Zhu, Yingjiu Li. 237-251 [doi]
- A Generic Distortion Free Watermarking Technique for Relational DatabasesSukriti Bhattacharya, Agostino Cortesi. 252-264 [doi]
- On Some Weaknesses in the Disk Encryption Schemes EME and EME2Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco RodrÃguez-HenrÃquez. 265-279 [doi]
- TWIS - A Lightweight Block CipherShrikant Ojha, Naveen Kumar, Kritika Jain, Sangeeta Lal. 280-291 [doi]
- Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model CheckingIndranil Saha, Debapriyay Mukhopadhyay. 292-300 [doi]
- Method-Specific Java Access Control via RMI Proxy Objects Using AnnotationsJeff Zarnett, Patrick Lam, Mahesh Tripunitara. 301-309 [doi]
- Let Only the Right One IN: Privacy Management Scheme for Social NetworkNagaraja Kaushik Gampa, Rohit Ashok Khot, Kannan Srinathan. 310-317 [doi]
- Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper)Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani. 318-325 [doi]