Abstract is missing.
- Flexible and Transparent User Authentication for Mobile DevicesNathan L. Clarke, Sevasti Karatzouni, Steven Furnell. 1-12 [doi]
- Combining Authentication, Reputation and Classification to Make Phishing UnprofitableAmir Herzberg. 13-24 [doi]
- Audio CAPTCHA for SIP-Based VoIPYannis Soupionis, George Tountas, Dimitris Gritzalis. 25-38 [doi]
- Roving Bugnet: Distributed Surveillance Threat and MitigationRyan Farley, Xinyuan Wang. 39-50 [doi]
- On Robust Covert Channels Inside DNSLucas Nussbaum, Pierre Neyron, Olivier Richard. 51-62 [doi]
- Discovering Application-Level Insider Attacks Using Symbolic ExecutionKarthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 63-75 [doi]
- Custom JPEG Quantization for Improved Iris Recognition AccuracyGerald Stefan Kostmajer, Herbert Stögner, Andreas Uhl. 76-86 [doi]
- On the IPP Properties of Reed-Solomon CodesMarcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo. 87-97 [doi]
- A Generic Authentication LoA Derivation ModelLi Yao, Ning Zhang. 98-108 [doi]
- Media-Break Resistant eSignatures in eGovernment: An Austrian ExperienceHerbert Leitold, Reinhard Posch, Thomas Rössler. 109-118 [doi]
- How to Bootstrap Security for Ad-Hoc Network: RevisitedWook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka. 119-131 [doi]
- Steganalysis of HydanJorge Blasco AlÃs, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros. 132-142 [doi]
- On the Impossibility of Detecting Virtual Machine MonitorsShay Gueron, Jean-Pierre Seifert. 143-151 [doi]
- Implementation of a Trusted Ticket SystemAndreas Leicher, Nicolai Kuntze, Andreas U. Schmidt. 152-163 [doi]
- A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in TorGuillermo Navarro-Arribas, JoaquÃn GarcÃa-Alfaro. 164-175 [doi]
- A Policy Language for Modelling RecommendationsAnas Abou El Kalam, Philippe Balbiani. 176-189 [doi]
- On the Security Validation of Integrated Security SolutionsAndreas Fuchs, Sigrid Gürgens, Carsten Rudolph. 190-201 [doi]
- Verification of Security Policy Enforcement in Enterprise SystemsPuneet Gupta, Scott D. Stoller. 202-213 [doi]
- Optimization of the Controlled Evaluation of Closed Relational QueriesJoachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag. 214-225 [doi]
- Collaborative Privacy - A Community-Based Privacy InfrastructureJan Kolter, Thomas Kernchen, Günther Pernul. 226-236 [doi]
- Security and Privacy Improvements for the Belgian eID TechnologyPieter Verhaeghe, Jorn Lapon, Bart De Decker, Vincent Naessens, Kristof Verslype. 237-247 [doi]
- A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure ComponentsThomas Brandstetter, Konstantin Knorr, Ute Rosenbaum. 248-258 [doi]
- Mining Stable Roles in RBACAlessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde. 259-269 [doi]
- Privacy-Preserving Content-Based Publish/Subscribe NetworksAbdullatif Shikfa, Melek Önen, Refik Molva. 270-282 [doi]
- Broadcast Encryption for Differently PrivilegedHongxia Jin, Jeffery Lotspiech. 283-293 [doi]
- Ontology-Based Secure XML Content DistributionMohammad Ashiqur Rahaman, Yves Roudier, Philip Miseldine, Andreas Schaad. 294-306 [doi]
- NGBPA Next Generation BotNet Protocol AnalysisFelix Leder, Peter Martini. 307-317 [doi]
- Non-repudiation Analysis with LySaMayla Brusò, Agostino Cortesi. 318-329 [doi]
- A Provably Secure Secret Handshake with Dynamic Controlled MatchingAlessandro Sorniotti, Refik Molva. 330-341 [doi]
- Towards a Theory of White-Box SecurityAmir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo. 342-352 [doi]
- On a Taxonomy of DelegationQuan Pham, Jason Reid, Adrian McCullagh, Ed Dawson. 353-363 [doi]
- Efficient Key Management for Enforcing Access Control in Outsourced ScenariosCarlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. 364-375 [doi]
- A Probabilistic Bound on the Basic Role Mining Problem and Its ApplicationsAlessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde. 376-386 [doi]
- Automating Access Control Logics in Simple Type Theory with LEO-IIChristoph Benzmüller. 387-398 [doi]
- In Law We Trust? Trusted Computing and Legal Responsibility for Internet SecurityYianna Danidou, Burkhard Schafer. 399-409 [doi]
- Persona: Network Layer Anonymity and Accountability for Next Generation InternetYannis Mallios, Sudeep Modi, Aditya Agarwala, Christina Johns. 410-420 [doi]
- Jason: A Scalable Reputation System for the Semantic WebSandra Steinbrecher, Stephan Groß, Markus Meichau. 421-431 [doi]
- Which Web Browsers Process SSL Certificates in a Standardized Way?Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri. 432-442 [doi]