Abstract is missing.
- Biometric Authentication in Infrastructure SecurityJohn Armington, Purdy Ho, Paul Koznek, Richard Martinez. 1-18 [doi]
- Denial of Access in Biometrics-Based Authentication SystemsLuciano Rila. 19-29 [doi]
- A Novel Approach to Proactive Password CheckingCarlo Blundo, Paolo D Arco, Alfredo De Santis, Clemente Galdi. 30-39 [doi]
- Single Sign-On ArchitecturesJan De Clercq. 40-58 [doi]
- Active Digital Credentials: Dynamic Provision of Up-to-Date Identity InformationMarco Casassa Mont, Richard Brown. 59-72 [doi]
- How to Buy Better TestingStuart E. Schechter. 73-87 [doi]
- Structured Risk AnalysisNeil A. McEvoy, Andrew Whitcombe. 88-103 [doi]
- A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security ControlsE. S. Siougle, V. C. Zorkadis. 104-114 [doi]
- Authentication and Authorization of Mobile Clients in Public Data NetworksPrakash Reddy, Venky Krishnan, Kan Zhang, Devaraj Das. 115-128 [doi]
- A Contemporary Foreword on GSM SecurityPaulo S. Pagliusi. 129-144 [doi]
- Vulnerability Assessment Simulation for Information Infrastructure ProtectionHyungjong Kim, KyungHee Koh, Donghoon Shin, HongGeun Kim. 145-161 [doi]
- Pseudonymizing Unix Log FilesUlrich Flegel. 162-179 [doi]
- DPS : An Architectural Style for Development of Secure SoftwarePascal Fenkam, Harald Gall, Mehdi Jazayeri, Christopher Krügel. 180-198 [doi]
- A New Infrastructure for User Tracking Prevention and Privacy Protection in Internet ShoppingMatthias Enzmann, Thomas Kunz, Markus Schneider 0002. 199-213 [doi]
- Different Smartcard-Based Approaches to Physical Access ControlÓscar Cánovas Reverte, Antonio F. Gómez-Skarmeta, Humberto Martínez Barberá, Gregorio Martínez Pérez. 214-226 [doi]
- Authenticity and Provability - A Formal FrameworkSigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph. 227-245 [doi]
- Protocol Engineering Applied to Formal Analysis of Security SystemsJavier Lopez, Juan J. Ortega, José M. Troya. 246-259 [doi]
- Applications of Multiple Trust Authorities in Pairing Based CryptosystemsL. Chen, Keith Harrison, David Soldera, Nigel P. Smart. 260-275 [doi]
- Plausible Deniability Using Automated Linguistic StegonagraphyMark Chapman, George I. Davida. 276-287 [doi]
- Virtual Software Tokens - A Practical Way to Secure PKI RoamingTaekyoung Kwon. 288-302 [doi]
- Bit-Serial AOP Arithmetic Architectures over GF (2:::m:::)Hyun-Sung Kim, Kee-Young Yoo. 303-313 [doi]
- A Practical Distributed Authorization System for GARAWilliam A. Adamson, Olga Kornievskaia. 314-324 [doi]
- Design of a VPN Software Solution Integrating TCP and UDP ServicesJavier Lopez, José A. Montenegro, Rodrigo Roman, Jorge Davila. 325-338 [doi]