Abstract is missing.
- Predicting Trustworthiness for Component SoftwareZheng Yan. 1-6 [doi]
- Remote Management and Secure Application Development for Pervasive Home Systems Using JASONBert Bos, Lukasz Chmielewski, Jaap-Henk Hoepman, Thanh Son Nguyen. 7-12 [doi]
- Usage Control Reference Monitor ArchitectureChristian Schaefer. 13-18 [doi]
- Secure Routing in Integrated Mobile Ad hoc Network (MANET)-InternetRamanarayana Kandikattu, Lillykutty Jacob. 19-24 [doi]
- A Survey on the Applicability of Trust Management Systems for Wireless Sensor NetworksM. Carmen Fernández Gago, Rodrigo Roman, Javier Lopez. 25-30 [doi]
- Location-aware Random Pair-wise Keys Scheme for Wireless Sensor NetworksJi Young Chun, Yong Ho Kim, Jongin Lim, Dong-Hoon Lee. 31-36 [doi]
- Towards effective Wireless Intrusion Detection in IEEE 802.11iAlexandros Tsakountakis, Georgios Kambourakis, Stefanos Gritzalis. 37-42 [doi]
- A New Certificate Signature for Pervasive EnvironmentRachid Saadi, Jean-Marc Pierson, Lionel Brunie. 43-48 [doi]
- A Security-by-Contract Architecture for Pervasive ServicesNicola Dragoni, Fabio Massacci, Christian Schaefer, Thomas Walter, Eric Vetillard. 49-54 [doi]
- Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID TagsPedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda. 55-60 [doi]
- Storage-Awareness: RFID Private Authentication based on Sparse TreeWeijia Wang, Yong Li 0002, Lei Hu, Li Lu. 61-66 [doi]
- Secure Mobile RFID system against privacy and security problemsIl-Jung Kim, Eun Young Choi, Dong-Hoon Lee. 67-72 [doi]
- Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID TagsHwaseong Lee, Eun Young Choi, Su-Mi Lee, Dong-Hoon Lee. 73-78 [doi]
- An Architecture for Secure VoIP and Collaboration ApplicationsDimitris Zisiadis, Spyros Kopsidas, Leandros Tassiulas. 79-84 [doi]
- Identity Based Private MatchingZhongsheng Wu, Zhide Chen, Fuchun Guo, Li Xu. 85-90 [doi]