Abstract is missing.
- Automatic Analysis of Security Properties of the TPMMark Dermot Ryan. 1-4 [doi]
- Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy TreesLukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski. 5-24 [doi]
- Secure Implementation of Asynchronous Method Calls and FuturesPeeter Laud. 25-47 [doi]
- Establishing Trust between Nodes in Mobile Ad-Hoc NetworksNicolai Kuntze, Carsten Rudolph, Janne Paatero. 48-62 [doi]
- Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards?Shin'ichiro Matsuo. 63-64 [doi]
- Security in the Distributed Internet of ThingsRodrigo Roman, Javier Lopez. 65-66 [doi]
- A Multi-criteria-Based Evaluation of Android ApplicationsGianluca Dini, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Andrea Saracino, Daniele Sgandurra. 67-82 [doi]
- Security Analysis of an Open Car Immobilizer Protocol StackStefan Tillich, Marcin Wójcik. 83-94 [doi]
- A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation SchemesErnie Brickell, Liqun Chen, Jiangtao Li 0001. 95-111 [doi]
- The Yin and Yang Sides of Embedded SecurityChristof Paar. 112-115 [doi]