Abstract is missing.
- Fighting Malicious SoftwareChristopher Kruegel. 1-15 [doi]
- VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser SecurityChaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor. 16-34 [doi]
- Security Assessment of Node.js PlatformAndres Ojamaa, Karl Düüna. 35-43 [doi]
- Foundations of Dynamic Access ControlPrasad Naldurg. 44-58 [doi]
- Risk-Aware RBAC SessionsKhalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu. 59-74 [doi]
- A Cognitive Trust Model for Access Control Framework in MANETSoumya Maity, Soumya Kanti Ghosh. 75-88 [doi]
- Trust-orBAC: A Trust Access Control Model in Multi-Organization EnvironmentsKhalifa Toumi, César Andrés, Ana R. Cavalli. 89-103 [doi]
- On Policies and IntentsMatthew L. Bolton, Celeste M. Wallace, Lenore D. Zuck. 104-118 [doi]
- ProtoLeaks: A Reliable and Protocol-Independent Network Covert ChannelArne Swinnen, Raoul Strackx, Pieter Philippaerts, Frank Piessens. 119-133 [doi]
- Energetic PixelsGoutam Paul, Ian Davidson, Imon Mukherjee, S. S. Ravi. 134-148 [doi]
- Fuzzy Inference Rule Based Reversible Watermarking for Digital ImagesRuchira Naskar, Rajat Subhra Chakraborty. 149-163 [doi]
- Secure Trust Metadata Management for Mobile Ad-Hoc NetworksVivek Natarajan, Yi Yang, Sencun Zhu. 164-180 [doi]
- Defence against Wormhole Attacks in Wireless Mesh NetworksRakesh Matam, Somanath Tripathy. 181-193 [doi]
- A Novel Key Update Protocol in Mobile Sensor NetworksSarita Agrawal, Rodrigo Roman, Manik Lal Das, Anish Mathuria, Javier Lopez. 194-207 [doi]
- Autonomous Certification with List-Based Revocation for Secure V2V CommunicationAnup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Aravind Iyer, Debojyoti Bhattacharya. 208-222 [doi]
- Mitigating Insider Threat on Database IntegrityWeihan Li, Brajendra Panda, Qussai Yaseen. 223-237 [doi]
- Coercion Resistant MIX for Electronic AuctionJaydeep Howlader, Jayanta Kar, Ashis Kumar Mal. 238-248 [doi]
- Verification of Money Atomicity in Digital Cash Based Payment SystemGirish Chandra, Divakar Yadav. 249-264 [doi]
- Cryptographic Analysis of a Type of Sequence GeneratorsAlberto Peinado, Amparo Fúster-Sabater. 265-276 [doi]
- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETsSoumyadev Maity, R. C. Hansdah. 277-293 [doi]
- Computationally Efficient Secure Access Control for Vehicular Ad Hoc NetworksY. Sreenivasa Rao, Ratna Dutta. 294-309 [doi]
- Tracking Insecure Information Flows: A Prototype Evaluator in ASF+SDFDoaa Hassan. 310-326 [doi]
- Attacking Image Based CAPTCHAs Using Image Recognition TechniquesDavid Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural, Vijayalakshmi Atluri. 327-342 [doi]
- Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples ApproachSimin Ghasemi, Morteza Noferesti, Mohammad Ali Hadavi, Sadegh Dorri Nogoorani, Rasool Jalili. 343-351 [doi]