Abstract is missing.
- Forgiving Biometric Security SystemsRaphael C.-W. Phan, John N. Whitley, David J. Parish. 1-8 [doi]
- Remotely Telling Humans and Computers Apart: An Unsolved ProblemCarlos Javier Hernández Castro, Arturo Ribagorda. 9-26 [doi]
- Leveraging Social Links for Trust and Privacy in NetworksLeucio Antonio Cutillo, Refik Molva, Thorsten Strufe. 27-36 [doi]
- Open Problems in Web 2.0 User Content SharingSan-Tsai Sun, Konstantin Beznosov. 37-51 [doi]
- Mitigating Drive-By Download Attacks: Challenges and Open ProblemsManuel Egele, Engin Kirda, Christopher Kruegel. 52-62 [doi]
- Context-Dependent Authentication and Access ControlMichael S. Kirkpatrick, Elisa Bertino. 63-75 [doi]
- New Directions in RFID SecurityErik-Oliver Blass, Refik Molva. 76-84 [doi]
- Tailored Security and Safety for Pervasive ComputingErik-Oliver Blass, Martina Zitterbart. 85-92 [doi]
- Rational ProtocolsChristian Cachin. 93-94 [doi]
- Security Issues for P2P-Based Voice- and Video-Streaming ApplicationsJan Seedorf. 95-110 [doi]
- Threshold Things That Think: Authorisation for ResharingRoel Peeters, Markulf Kohlweiss, Bart Preneel. 111-124 [doi]
- Privacy Policies, Tools and Mechanisms of the FutureVincent Naessens, Mehmet Tahir Sandikkaya, Jorn Lapon, Kristof Verslype, Pieter Verhaeghe, Girma Nigusse, Bart De Decker. 125-138 [doi]
- Security and Privacy Preservation in Human-Involved NetworksCraig Asher, Jean-Philippe Aumasson, Raphael C.-W. Phan. 139-148 [doi]
- Discussing Anonymity Metrics for Mix Based Anonymity ApproachesDang Vinh Pham, Joss Wright. 149-168 [doi]