Abstract is missing.
- Pseudonymised communication in delay tolerant networksNaveed Ahmad, Haitham S. Cruickshank, Zhili Sun, Muhammad Asif. 1-6 [doi]
- Trust bootstrapping services and service providersZainab M. Aljazzaf, Miriam A. M. Capretz, Mark Perry. 7-15 [doi]
- Safe realization of the Generalization privacy mechanismTristan Allard, Benjamin Nguyen, Philippe Pucheral. 16-23 [doi]
- The ultimate invasion of privacy: Identity theftEsma Aïmeur, David Schönfeld. 24-31 [doi]
- Towards machine-assisted formal procedures for the collection of digital evidenceMartín Barrère, Gustavo Betarte, Marcelo Rodríguez. 32-35 [doi]
- On Re-use of randomness in broadcast encryptionPaolo Gasti, Alessio Merlo. 36-43 [doi]
- Extraction and comprehension of moodle's access control model: A case studyFrançois Gauthier, Dominic Letarte, Thierry Lavoie, Ettore Merlo. 44-51 [doi]
- Modelling of security properties in AlloyLilia Georgieva. 52-54 [doi]
- Privacy Data Envelope: Concept and implementationMahmoud Ghorbel, Armen Aghasaryan, Stéphane Betgé-Brezetz, Marie-Pascale Dupont, Guy-Bertrand Kamga, Sophie Piekarec. 55-62 [doi]
- A trust-based approach against IP-spoofing attacksJesus M. Gonzalez, Mohd Anwar, James B. D. Joshi. 63-70 [doi]
- Improving the use of advisor networks for multi-agent trust modellingJoshua Gorner, Jie Zhang, Robin Cohen. 71-78 [doi]
- I-RBAC: Isolation enabled role-based access controlNagajyothi Gunti, Weiqing Sun, Mohammed Y. Niamat. 79-86 [doi]
- Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognitionAbbas Javadtalab, Laith Abbadi, Mona Omidyeganeh, Shervin Shirmohammadi, Carlisle M. Adams, Abdulmotaleb El-Saddik. 87-92 [doi]
- A hamming distance-like filtering in keystroke dynamicsYoshihiro Kaneko, Yuji Kinpara, Yuta Shiomi. 93-95 [doi]
- Ensuring tight computational security against higher-order DPA attacksDakshita Khurana, Aditya Gaurav. 96-101 [doi]
- Forward secure identity-based key agreement for dynamic groupsNick Mailloux, Ali Miri, Monica Nevins. 102-111 [doi]
- UPBA: User-Authenticated Property-Based AttestationMark Manulis, Marion Steiner. 112-119 [doi]
- On the need for data flow graph visualization of Forensic Lucid programs and encoded evidence, and their evaluation by GIPSYSerguei A. Mokhov, Joey Paquet, Mourad Debbabi. 120-123 [doi]
- Delegation of access rights in a privacy preserving access control modelMd. Moniruzzaman, Ken Barker. 124-133 [doi]
- Improving security and usability of low cost RFID tagsAli Nur Mohammad Noman, Sk. Md. Mizanur Rahman, Carlisle Adams. 134-141 [doi]
- Model-based systems security quantificationSamir Ouchani, Yosr Jarraya, Otmane Aït Mohamed. 142-149 [doi]
- A probabilistic-based approach towards trust evaluation using Poisson Hidden Markov Models and Bonus Malus SystemsKevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis. 150-155 [doi]
- Validation of security for participant control exchanges in multicast content distributionMohammad Parham, John William Atwood. 156-163 [doi]
- Cryptographic security models for eHealth P2P database management systems networkSk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto. 164-173 [doi]
- Detecting P2P botnets through network behavior analysis and machine learningSherif Saad, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian. 174-180 [doi]
- Data preprocessing for distance-based unsupervised Intrusion DetectionDina Said, Lisa Stirling, Peter Federolf, Ken Barker. 181-188 [doi]
- Risk-based decision method for access control systemsRiaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski. 189-192 [doi]
- Advantages of a non-technical XACML notation in role-based modelsBernard Stepien, Stan Matwin, Amy P. Felty. 193-200 [doi]
- A Diffie-Hellman based privacy protocol for Car-to-X communicationHagen Stübing, Murat Ceven, Sorin A. Huss. 201-204 [doi]
- Secure communication with secret sharing in static computer networks with partition in mistrust partiesJohannes Viehmann. 205-212 [doi]
- Privacy challenges of open APIs: Case location based servicesAlberto Vila Tena, Yrjö Raivio. 213-220 [doi]
- General Secure Function Evaluation using standard trusted computing hardwareSteve R. Tate, Roopa Vishwanathan. 221-228 [doi]
- Beyond privacy policies - assessing inherent privacy risks of consumer health servicesJens H. Weber-Jahnke, James B. Williams. 229-237 [doi]
- An implementation of a verification condition generator for foundational proof-carrying codeJiangong Weng, Amy P. Felty. 238-245 [doi]
- Performance analysis of QKD based key distribution for IEEE 802.11 networksShirantha Wijesekera, Xu Huang, Dharmendra Sharma. 246-251 [doi]
- Privacy-preserving matchmaking For mobile social networking secure against malicious usersQi Xie, Urs Hengartner. 252-259 [doi]
- Online information privacy: Agent-mediated payoffAbdulsalam Yassine, Ali A. Nazari Shirehjini, Shervin Shirmohammadi, Thomas T. Tran. 260-263 [doi]
- RC4 state and its applicationsQian Yu, Chang N. Zhang. 264-269 [doi]