Abstract is missing.
- Additional Reviewers [doi]
- Welcome Message [doi]
- Technical Program Committee [doi]
- Service-Oriented Security Architecture for CII based on Sensor NetworksJavier Lopez, José A. Montenegro, Rodrigo Roman. 1-6 [doi]
- Detecting Critical Nodes for MANET Intrusion Detection SystemsA. Karygiannis, E. Antonakakis, A. Apostolopoulos. 7-15 [doi]
- An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDSEmmanuel Hooper. 16-21 [doi]
- A Hash-based Pseudonymization Infrastructure for RFID SystemsDirk Henrici, Joachim Götze, Paul Müller. 22-27 [doi]
- HB:::++:::: a Lightweight Authentication Protocol Secure against Some AttacksJulien Bringer, Hervé Chabanne, Emmanuelle Dottax. 28-33 [doi]
- Design and implementation of TruMan, a Trust Manager Component for Distributed SystemsValentina Casola, Luigi Coppolino, Antonino Mazzeo, Nicola Mazzocca, Massimiliano Rak. 34-40 [doi]
- iHIDE: Hiding Sources of Information in WSNsL. Kazatzopoulos, C. Delakouridis, Giannis F. Marias, Panagiotis Georgiadis. 41-48 [doi]
- On the Impact of Unwanted Traffic onto a 3G NetworkFabio Ricciato, Philipp Svoboda, Eduard Hasenleithner, Wolfgang Fleischer. 49-56 [doi]
- On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on TI Signal ProcessorsMilan Markovic, Goran Dordevic. 57-62 [doi]
- Enhanced Privacy in Key-Exchange Protocols by One-time IDKenji Imamoto, Kouichi Sakurai. 63-68 [doi]
- An Effective Approach for Accurate Estimation of Trust of Distant Information Sources in the Semantic WebVangelis G. Bintzios, Thanasis G. Papaioannou, George D. Stamoulis. 69-74 [doi]
- A Conceptual Architecture of a Trusted Mobile EnvironmentZheng Yan. 75-81 [doi]
- Using One-Way Chains to Provide Message Authentication without Shared SecretsBogdan Groza. 82-87 [doi]
- Pervasive Trusted ComputingShane Balfe, Shiqun Li, Jianying Zhou. 88-94 [doi]