Abstract is missing.
- Personalized Mobile Services with Lightweight Security in a Sports AssociationJan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens. 3-14 [doi]
- User Authentication for Online Applications Using a USB-Based Trust DeviceJulian Jang, Dongxi Liu, Surya Nepal, John Zic. 15-26 [doi]
- XtreemOS-MD SSO - A Plugable, Modular SSO Software for Mobile GridsJosé María Peribáñez, Alvaro Martínez, Santiago Prieto, Noé Gallego. 27-38 [doi]
- A Mobile and Reliable Anonymous ePoll InfrastructurePieter Verhaeghe, Kristof Verslype, Jorn Lapon, Vincent Naessens, Bart De Decker. 41-52 [doi]
- Enhancing Privacy-Preserving Access Control for Pervasive Computing EnvironmentsEmmanouil Magkos, Panayiotis Kotzanikolaou. 53-64 [doi]
- Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc NetworksSaif Al-Kuwari, Stephen D. Wolthusen. 67-79 [doi]
- A Privacy-Enabled Architecture for Location-Based ServicesMartin Werner. 80-90 [doi]
- A Novel Scheme for Supporting Location Authentication of Mobile NodesOsama Elshakankiry, Andy Carpenter, Ning Zhang. 91-102 [doi]
- Optimized Resource Access Control in Shared Sensor NetworksChristophe Huygens, Nelson Matthys, Wouter Joosen. 105-116 [doi]
- Secure Distribution of the Device Identity in Mobile Access NetworkKonstantin Shemyak. 117-126 [doi]
- Network Resilience in Low-Resource Mobile Wireless Sensor NetworksBai Li, Lynn Margaret Batten, Robin Doss. 127-138 [doi]
- An Analysis of the iKee.B iPhone BotnetPhillip A. Porras, Hassen Saïdi, Vinod Yegneswaran. 141-152 [doi]
- Event-Based Method for Detecting Trojan Horses in Mobile DevicesDaniel Fuentes, Juan Antonio Álvarez, Juan Antonio Ortega, Luis González Abril, Francisco Velasco. 153-162 [doi]
- AES Data Encryption in a ZigBee Network: Software or Hardware?Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere. 163-173 [doi]