Abstract is missing.
- Accountable Anonymous E-MailVincent Naessens, Bart De Decker, Liesje Demuynck. 3-18
- Protecting Consumer Data in Composite Web ServicesCraig Pearce, Peter Bertók, Ron G. van Schyndel. 19-34
- A Decision Matrix ApproachAlbin Zuccato. 35-50
- Assignment of Security Clearances in an OrganizationLech J. Janczewski, Victor Portougal. 51-64
- Tool Supported Management of Information Security CultureThomas Schlienger, Stephanie Teufel. 65-78
- ERPSEC - A Reference Framework to Enhance Security in ERP SystemsSebastiaan H. von Solms, M. P. Hertenberger. 79-94
- A New Architecture for User Authentication and Key Exchange Using Password for Federated EnterprisesYanjiang Yang, Feng Bao, Robert H. Deng. 95-112
- A Secure Quantum Communication Protocol Using Insecure Public ChannelsI-Ming Tsai, Chia-Mu Yu, Wei-Ting Tu, Sy-Yen Kuo. 113-126
- Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed SystemsJoon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano. 127-142
- Design and Implementation a TPM Chip SUP320 by SOCJiang-chun Ren, Kui Dai, Zhiying Wang, Xue-mi Zhao, Yuan-man Tong. 143-154
- Mathematical Models of IP Traceback Methods and Their VerificationKeisuke Ohmori, Ayako Suzuki, Mariko Kawabata, Ryu Matsushima, Manabu Ohmuro, Toshifumi Kai, Shigeru Nishiyama. 155-170
- Transferable E-Cash RevisitJoseph K. Liu, Sandy H. Wong, Duncan S. Wong. 171-188
- A License Transfer System for Supporting Content Portability in Digital Rights ManagementQiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard. 189-204
- Secure Person-To-Person Communications Based on Biometrics SignalsYongdong Wu, Feng Bao, Robert H. Deng. 205-222
- Distance-Bounding Proof of Knowledge to Avoid Real-Time AttacksLaurent Bussard, Walid Bagga. 223-238
- An Adaptive Multicast Polling Scheme for IEEE 802.11 Wireless LANKyung-jun Kim, HyunSook Kim, Sang-Don Lee, Ki Jun Han. 239-250
- The Pairing Problem with User InteractionThomas Peyrin, Serge Vaudenay. 251-266
- Network Smart Card: A New Paradigm of Secure Online TransactionsAsad Ali, Karen Lu, Michael Montgomery. 267-280
- Protection Against Spam Using Pre-ChallengesRodrigo Roman, Jianying Zhou, Javier Lopez. 281-294
- Automatically Hardening Web Applications Using Precise TaintingAnh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans. 295-308
- Traffic Redirection Attack Protection System (TRAPS) - A Full-Fledged Adaptive DoS/DDoS Attack Mitigation SchemeVrizlynn L. L. Thing, Henry C. J. Lee, Morris Sloman. 309-326
- Statistical Signatures for Early Detection of Flooding Denial-Of-Service AttacksJohn Haggerty, Qi Shi, Madjid Merabti. 327-342
- Design, Implementation, and Evaluation of FRiTrace Wayne Huang, J. L. Cong, Chien-Long Wu, Fan Zhao, Shyhtsun Felix Wu. 343-358
- Design and Implementation of a High-Performance Network Intrusion Prevention SystemKonstantinos Xinidis, Kostas G. Anagnostakis, Evangelos P. Markatos. 359-374
- STRIDE: Polymorphic Sled Detection through Instruction Sequence AnalysisPeriklis Akritidis, Evangelos P. Markatos, Michalis Polychronakis, Kostas G. Anagnostakis. 375-392
- Piranha: Fast and Memory-Efficient Pattern Matching for Intrusion DetectionSpyros Antonatos, Michalis Polychronakis, Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos. 393-408
- Designated-Verifier Proxy Signature SchemesGuilin Wang. 409-424
- Tripartite Concurrent SignaturesWilly Susilo, Yi Mu. 425-442
- Signcryption in Hierarchical Identity Based CryptosystemSherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu. 443-457
- Protecting Group Dynamic Information in Large Scale Multicast GroupsYongdong Wu, Tieyan Li, Robert H. Deng. 459-476
- Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc NetworksShrikant Sundaram, Peter Bertók, Benjamin Burton. 477-492
- Ensuring Media Integrity on Third-Party InfrastructuresJana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith. 493-508
- A New Fragile Mesh Watermarking Algorithm for AuthenticationHao-Tian Wu, Yiu-ming Cheung. 509-524
- New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White ImagesYuji Suga. 525-536
- Overcoming Channel Bandwidth Constraints in Secure SIM ApplicationsJohn A. MacDonald, William G. Sirett, Chris J. Mitchell. 539-550
- On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client ImplementationK. Papapanagiotou, Constantinos Markantonakis, Qing Zhang 0002, William G. Sirett, Keith Mayes. 551-564
- On-the-Fly Formal Testing of a Smart Card AppletArjen van Weelden, Martijn Oostdijk, Lars Frantzen, Pieter W. M. Koopman, Jan Tretmans. 565-576
- Side Channel Analysis, Fault Injection and Applications - A Computationally Feasible SPA Attack on AES via Optimized SearchJoel VanLaven, Mark Brehob, Kevin J. Compton. 577-588
- The Proof by 2M-1: a Low-Cost Method to Check Arithmetic ComputationsSylvain Guilley, Philippe Hoogvorst. 589-600
- StreamTo: Streaming Content using a Tamper-Resistant TokenJieyin Cheng, Cheun Ngen Chong, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Stefan Nikolaus. 601-612