Abstract is missing.
- Forgive and forget: return to obscurityMatt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates, Steven Greenspan. 1-10 [doi]
- Towards the realization of a public health system for shared secure cyber-spaceJeff Rowe, Karl N. Levitt, Mike Hogarth. 11-18 [doi]
- Detecting hidden enemy lines in IP address spaceSuhas Mathur, Baris Coskun, Suhrid Balakrishnan. 19-30 [doi]
- Useful password hashing: how to waste computing cycles with styleMarkus Dürmuth. 31-40 [doi]
- Markets for zero-day exploits: ethics and implicationsSerge Egelman, Cormac Herley, Paul C. van Oorschot. 41-46 [doi]
- Principles of authenticationSean Peisert, Edward B. Talbot, Tom Kroeger. 47-56 [doi]
- Towards narrative authentication: or, against boring authenticationAnil Somayaji, David Mould, Carson Brown. 57-64 [doi]
- Go with the flow: toward workflow-oriented security assessmentBinbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K. Y. Yau. 65-76 [doi]
- Explicit authentication response considered harmfulLianying Zhao, Mohammad Mannan. 77-86 [doi]
- Can we sell security like soap?: a new approach to behaviour changeDebi Ashenden, Darren Lawrence. 87-94 [doi]
- Booby trapping softwareStephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz. 95-106 [doi]
- Information behaving badlyJulie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun. 107-118 [doi]
- Designing forensic analysis techniques through anthropologySathya Chandran Sundaramurthy. 119-120 [doi]
- NSPHD: the polyglot computerDaniel Medeiros Nunes de Castro. 121-122 [doi]