Abstract is missing.
- Co-located Physical-Layer Network Coding to mitigate passive eavesdroppingMichael Hay, Basil Saeed, Chung-Horng Lung, Anand Srinivasan. 1-2 [doi]
- Ray - a secure micro kernel architectureStefan Nürnberger, Thomas Feller, Sorin A. Huss. 3-6 [doi]
- Method ontology for intelligent network forensics analysisSherif Saad, Issa Traoré. 7-14 [doi]
- Detection, correlation, and visualization of attacks against critical infrastructure systemsLinda Briesemeister, Steven Cheung, Ulf Lindqvist, Alfonso Valdes. 15-22 [doi]
- Achieving critical infrastructure protection through the interaction of computer security and network forensicsRay Hunt, Jill Slay. 23-30 [doi]
- On the analysis of the Zeus botnet crimeware toolkitHamad Binsalleeh, Thomas Ormerod, Amine Boukhtouta, Prosenjit Sinha, Amr M. Youssef, Mourad Debbabi, Lingyu Wang. 31-38 [doi]
- On the representation and verification of cryptographic protocols in a theory of actionJames P. Delgrande, Aaron Hunter, Torsten Grote. 39-45 [doi]
- J3: High payload histogram neutral JPEG steganographyMahendra Kumar, Richard E. Newman. 46-53 [doi]
- Design of distributed security architecture for multihop WiMAX networksPerumalraja Rengaraju, Chung-Horng Lung, Anand Srinivasan. 54-61 [doi]
- Security advances and challenges in 4G wireless networksNabil Seddigh, Biswajit Nandy, Rupinder Makkar, Jean-Francois Beaumont. 62-71 [doi]
- The relationship of trust, demand, and utility: Be more trustworthy, then i will buy moreAmirali Salehi-Abari, Tony White. 72-79 [doi]
- Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networksSanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Aziz Bouras. 80-87 [doi]
- Trust-aware monitoring scheme for WiMAX networksHaïdar Safa, Farah Abu Shahla. 88-95 [doi]
- Vampire bats: Trust in PrivacyTracy Ann Kosa. 96-102 [doi]
- Towards a privacy preserving policy based infrastructure for social data access to enable scientific researchPalanivel Andiappan Kodeswaran, Evelyne Viegas. 103-109 [doi]
- A new perspective of privacy protection: Unique distinct l-SR diversityYunli Wang, Yan Cui, Liqiang Geng, Hongyu Liu. 110-117 [doi]
- Analysis of Privacy Impact Assessments within Major jurisdictionsDavid Tancock, Siani Pearson, Andrew Charlesworth. 118-125 [doi]
- Efficient privacy preserving reputation protocols inspired by secure sumOmar Hasan, Elisa Bertino, Lionel Brunie. 126-133 [doi]
- Social networks for health care: Addressing regulatory gaps with privacy-by-designJames B. Williams, Jens H. Weber-Jahnke. 134-143 [doi]
- Transaction signing in applications using identity federationPaul Rabinovich. 144-149 [doi]
- On achieving a digital identity management system with support for non-transferabilityBrent Carrara, Carlisle Adams. 150-159 [doi]
- Risk analysis in access control systemsJi Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo. 160-166 [doi]
- Secure architecture for RFID enabled supply chain hierarchyNauman Abdullah Shah, Muhammad Arif Wahla. 167-172 [doi]
- A model-driven penetration test framework for Web applicationsPulei Xiong, Liam Peyton. 173-180 [doi]
- Lightweight protection against brute force login attacks on Web applicationsCarlisle Adams, Guy-Vincent Jourdan, Jean-Pierre Levac, François Prevost. 181-188 [doi]
- New approach for the dynamic enforcement of Web services securityAzzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok. 189-196 [doi]
- Guessing click-based graphical passwords by eye trackingDaniel Leblanc, Alain Forget, Robert Biddle. 197-204 [doi]
- Keystroke dynamics: Characteristics and opportunitiesHeather Crawford. 205-212 [doi]
- You are the key: Generating cryptographic keys from voice biometricsBrent Carrara, Carlisle Adams. 213-222 [doi]
- Secure Information Processing with Privacy Assurance - standard based design and development for biometric applicationsBon K. Sy, Adam Ramirez, Arun Prakash Kumara Krishnan. 223-230 [doi]
- Security of Error Correcting Code for biometric EncryptionAlex Stoianov. 231-235 [doi]