Abstract is missing.
- e-ID and Smartcards - Current Status, Hopeful Developments and Best PracticesGraham Williamson. 17-24 [doi]
- European Citizen Card Combined with Travel Document Function, Convergence or Divergence?Detlef Houdeau. 25-29 [doi]
- Physical Unclonable Functions for enhanced security of tokens and tagsPim Tuyls, Boris Skoric. 30-37 [doi]
- Hardware Security Features for Secure Embedded DevicesHelena Handschuh, Elena Trichina. 38-44 [doi]
- Security in Next Generation Consumer Electronic DevicesTom Kan, Tim Kerins, Klaus Kursawe. 45-53 [doi]
- Security Architecture for Device Encryption and VPNAmmar Alkassar, Michael Scheibel, Michael Stübel, Ahmad-Reza Sadeghi, Marcel Winandy. 54-63 [doi]
- TPM Enterprise Key Management requires centralized Hardware-based SecurityBernhard Weiss. 64-71 [doi]
- ISOIIEC 24727 - A Future Standard for Smart Card MiddlewareStephan Spitz, Jens Urmann, Gisela Meister. 102-107 [doi]
- Information Security Standardization - the ETSI PerspectiveCharles Brookson, Dionisio Zumerle. 108-118 [doi]
- Digital Signatures without the HeadachesNick Pope, Juan Carlos Cruellas. 119-128 [doi]
- Could Test Standards Help on the Way to Achieve Global e-Passport Interoperability?Andreas M. Wolf. 129-138 [doi]
- A New Standard Based Road to Interoperable Strong AuthenticationPhilip Hoyer. 139-147 [doi]
- Identifying Patterns of Federation AdoptionHeather M. Hinton, Mark Vandenwauver. 151-160 [doi]
- Fidelity: Federated Identity Management Security based on Liberty Alliance on European AmbitManel Medina, Miquel Colomer, Sandra Garcia Polo, Antoine de Poorter. 161-167 [doi]
- Implementing role based access control - How we can do it better!Marko Vogel. 176-185 [doi]
- Identity and Access Control - Demonstrating ComplianceMarc Sel, Bart Van Rompay. 186-195 [doi]
- Robust and Secure Biometrics: Some Application ExamplesTom A. M. Kevenaar, Geert Jan Schrijen, Anton H. M. Akkermans, M. Damstra, Pim Tuyls, Michiel van der Veen. 196-203 [doi]
- Selecting the Optimal Biometric 2-factor Authentication Method - a User's ViewpointGunter Bitz. 204-210 [doi]
- A Face Recognition System for Mobile PhonesPaolo Abeni, Madalina Baltatu, Rosalia D Alessandro. 211-217 [doi]
- Advanced certificate validation service for secure Service-Oriented ArchitecturesAntonio Ruiz-Martínez, Daniel Sánchez-Martínez, C. Inmaculada Marín-López, Antonio F. Gómez-Skarmeta. 218-227 [doi]
- MADSig: Enhancing Digital Signature to Capture Secure Document Processing RequirementsJean-Christophe R. Pazzaglia, Stefano Crosta. 241-248 [doi]
- PKi Consolidation Project and Multiapplicative Smart Payment CardsMilan Markovic, Milos Kilibarda, Aleksandar Milosevic. 249-258 [doi]
- Security Analysis and Configuration of Large NetworksAntonio Lioy. 259-265 [doi]
- S-VPN Policy: Access List Conflict Automatic Analysis and ResolutionSimone Ferraresi, Stefano Pesic, Livia Trazza, Andrea Baiocchi. 266-274 [doi]
- Lock-Keeper: A New Implementation of Physical Separation TechnologyFeng Cheng 0002, Christoph Meinel. 275-286 [doi]
- SPEECH: Secure Personal End-to-End Communication with HandheldAniello Castiglione, Giuseppe Cattaneo, Alfredo De Santis, Fabio Petagna, Umberto Ferraro Petrillo. 287-297 [doi]
- Finding the Mobile Trusted ElementFabio Ricciato, Maura Turolla, Antonio Varriale. 298-307 [doi]
- Centrally Administered COIs Using Cross-Organizational TrustKevin Foltz, Coimbatore Chandersekaran. 311-317 [doi]
- Modelling the Economics of Free and Open Source Software SecurityAnas Tawileh, Jeremy Hilton, Steve McIntosh. 326-335 [doi]
- Securing service-oriented applicationsAnthony J. Nadalin, Nataraj Nagaratnam, Maryann Hondo. 336-343 [doi]
- A Service Oriented Trust Development PlatformHelena Rifà, Francisco Jordan. 344-355 [doi]
- A Trust Label for Secure and Compliant e-ID Applications: The Belgian ExperienceGeert Somers, Jos Dumortier. 356-362 [doi]
- Electronic signature in Italy after ten years of running in Giovanni Manca. 363-373 [doi]
- Internet Early Warning System: The Global ViewNorbert Pohlmann, Marcus Proest. 377-386 [doi]
- Blending Corporate Governance with Information SecurityYves Le Roux. 396-404 [doi]
- On Privacy-aware Information Lifecycle Management in Enterprises: Setting the ContextMarco Casassa Mont. 405-414 [doi]
- Regulation of State Surveillance of the InternetMurdoch Watney. 415-425 [doi]
- How Can NRA Contribute to the Improvement of IT Security?Rytis Rainys. 426-432 [doi]
- Information Security Regulation: Tomorrow Never Dies?Andreas Mitrakas. 433-438 [doi]
- Introducing Regulatory Compliance Requirements EngineeringShahbaz Ali, Jon Hall. 439-447 [doi]
- Legal Issues in Secure Grid Computing EnvironmentsIrene Kafeza, Eleanna Kafeza, Felix Wai-Hon Chan. 448-454 [doi]
- The Impact of Monitoring Technology on the LawPieter Kleve, Richard V. De Mulder, Kees van Noortwijk. 455-466 [doi]