Abstract is missing.
- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock MarketJan Muntermann, Heiko Roßnagel. 1-14 [doi]
- Facilitating the Adoption of Tor by Focusing on a Promising Target GroupHeiko Roßnagel, Jan Zibuschka, Lexi Pimenidis, Thomas Deselaers. 15-27 [doi]
- A Parallelism-Based Approach to Network AnonymizationIgor Margasinski. 28-43 [doi]
- Security Usability of Petname SystemsMd. Sadek Ferdous, Audun Jøsang, Kuldeep Singh, Ravishankar Borgaonkar. 44-59 [doi]
- An Analysis of Widget SecurityKarsten Peder Holth, Do van Thuan, Ivar Jørstad, Do Van Thanh. 60-71 [doi]
- Trade-Offs in Cryptographic Implementations of Temporal Access ControlJason Crampton. 72-87 [doi]
- Blunting Differential Attacks on PIN Processing APIsRiccardo Focardi, Flaminia L. Luccio, Graham Steel. 88-103 [doi]
- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network TrafficEjaz Ahmed, Andrew Clark, George M. Mohay. 104-119 [doi]
- An Improved Attack on TKIPFinn Michael Halvorsen, Olav Haugen, Martin Eian, Stig F. Mjølsnes. 120-132 [doi]
- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating SystemLander Casado, Philippas Tsigas. 133-147 [doi]
- A Mechanism for Identity Delegation at Authentication LevelNaveed Ahmed, Christian D. Jensen. 148-162 [doi]
- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time ServicesHeiko Roßnagel, Jan Muntermann. 163-178 [doi]
- Towards True Random Number Generation in Mobile EnvironmentsJan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svenda. 179-189 [doi]
- Towards Modelling Information Security with Key-Challenge Petri NetsMikko Kiviharju, Teijo Venäläinen, Suna Kinnunen. 190-206 [doi]
- Security and Trust for the Norwegian E-Voting Pilot Project ::::E-valg 2011::::Arne Ansper, Sven Heiberg, Helger Lipmaa, Tom André Øverland, Filip van Laenen. 207-222 [doi]
- Advanced SIM Capabilities Supporting Trust-Based ApplicationsThomas Vilarinho, Kjetil Haslum, Josef Noll. 223-238 [doi]
- Towards Practical Enforcement TheoriesNataliia Bielova, Fabio Massacci, Andrea Micheletti. 239-254 [doi]
- Security Analysis of AN.ON s Payment SchemeBenedikt Westermann. 255-270 [doi]
- Formal Analysis of the Estonian Mobile-ID ProtocolPeeter Laud, Meelis Roos. 271-286 [doi]
- Generating In-Line Monitors for Rabin AutomataHugues Chabot, Raphael Khoury, Nadia Tawbi. 287-301 [doi]