Abstract is missing.
- BloomCasting: Security in Bloom Filter Based MulticastMikko Särelä, Christian Esteve Rothenberg, András Zahemszky, Pekka Nikander, Jörg Ott. 1-16 [doi]
- Authentication Session MigrationSanna Suoranta, Jani Heikkinen, Pekka Silvekoski. 17-32 [doi]
- Mitigation of Unsolicited Traffic across Domains with Host Identities and PuzzlesMiika Komu, Sasu Tarkoma, Andrey Lukyanenko. 33-48 [doi]
- Experimental Analysis of the Femtocell Location Verification TechniquesRavishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert. 49-54 [doi]
- "Why Wasn't I Notified?": Information Security Incident Reporting DemystifiedErka Koivunen. 55-70 [doi]
- Use of Ratings from Personalized Communities for Trustworthy Application InstallationPern Hui Chia, Andreas P. Heiner, N. Asokan. 71-88 [doi]
- Practical Private Information Aggregation in Large NetworksGunnar Kreitz, Mads Dam, Douglas Wikström. 89-103 [doi]
- Tracking Malicious Hosts on a 10Gbps Backbone LinkMagnus Almgren, Wolfgang John. 104-120 [doi]
- Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent PracticesElahe Kani-Zabihi, Lizzie Coles-Kemp. 121-135 [doi]
- Analyzing Characteristic Host Access Patterns for Re-identification of Web User SessionsDominik Herrmann, Christoph Gerber, Christian Banse, Hannes Federrath. 136-154 [doi]
- A Framework for the Modular Specification and Orchestration of Authorization PoliciesJason Crampton, Michael Huth. 155-170 [doi]
- Credential Disabling from Trusted Execution EnvironmentsKari Kostiainen, N. Asokan, Jan-Erik Ekberg. 171-186 [doi]
- Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards ApplicationsOlga Gadyatskaya, Fabio Massacci, Federica Paci, Sergey Stankevich. 187-192 [doi]
- Implementing Erasure Policies Using Taint AnalysisFilippo Del Tedesco, Alejandro Russo, David Sands. 193-209 [doi]
- A Taint Mode for Python via a LibraryJuan José Conti, Alejandro Russo. 210-222 [doi]
- Security of Web Mashups: A SurveyPhilippe De Ryck, Maarten Decat, Lieven Desmet, Frank Piessens, Wouter Joosen. 223-238 [doi]
- Safe Wrappers and Sane Policies for Self Protecting JavaScriptJonas Magazinius, Phu H. Phung, David Sands. 239-255 [doi]
- Protocol Implementation GeneratorJose Quaresma, Christian W. Probst. 256-268 [doi]
- Secure and Fast Implementations of Two Involution CiphersBilly Bob Brumley. 269-282 [doi]
- The PASSERINE Public Key Encryption and Authentication MechanismMarkku-Juhani O. Saarinen. 283-288 [doi]