Abstract is missing.
- DAFA - A Lightweight DES Augmented Finite Automaton CryptosystemSarshad Abubaker, Kui Wu. 1-18 [doi]
- Improvement on Ahn et al.'s RSA P-Homomorphic Signature SchemeZhiwei Wang. 19-28 [doi]
- Building General-Purpose Security Services on EMV Payment CardsChunhua Chen 0002, Shaohua Tang, Chris J. Mitchell. 29-44 [doi]
- Anonymous Transferable Conditional E-cashJiangxiao Zhang, Zhoujun Li, Hua Guo. 45-60 [doi]
- Two Improvements of Random Key Predistribution for Wireless Sensor NetworksJirí Kur, Vashek Matyás, Petr Svenda. 61-75 [doi]
- A Detection Mechanism for SMS Flooding Attacks in Cellular NetworksEun-Kyoung Kim, Patrick McDaniel, Thomas F. La Porta. 76-93 [doi]
- Set Difference Attacks in Wireless Sensor NetworksTulio de Souza, Joss Wright, Piers O'Hanlon, Ian Brown. 94-111 [doi]
- JSGuard: Shellcode Detection in JavaScriptBoxuan Gu, Wenbin Zhang, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan. 112-130 [doi]
- Detection of Configuration Vulnerabilities in Distributed (Web) EnvironmentsMatteo Maria Casalino, Michele Mangili, Henrik Plate, Serena Elisa Ponta. 131-148 [doi]
- BINSPECT: Holistic Analysis and Detection of Malicious Web PagesBirhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam. 149-166 [doi]
- Improving the Resilience of an IDS against Performance Throttling AttacksGovind Sreekar Shenoy, Jordi Tubella, Antonio González. 167-184 [doi]
- The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrentTom Chothia, Marco Cova, Chris Novakovic, Camilo González Toro. 185-202 [doi]
- Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion DetectionYuxin Meng, Lam-for Kwok, Wenjuan Li. 203-221 [doi]
- Data Leak Detection as a ServiceXiaokui Shu, Danfeng (Daphne) Yao. 222-240 [doi]
- Revealing Cooperating Hosts by Connection Graph AnalysisJan Jusko, Martin Rehák. 241-255 [doi]
- New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure ControlAbdun Naser Mahmood, Md. Enamul Kabir, Abdul K. Mustafa. 256-272 [doi]
- More Anonymity through Trust Degree in Trust-Based Onion RoutingPeng Zhou, Xiapu Luo, Rocky K. C. Chang. 273-291 [doi]
- Privacy Preserving Back-Propagation Learning Made Practical with Cloud ComputingJiawei Yuan, Shucheng Yu. 292-309 [doi]
- Random Host Mutation for Moving Target DefenseEhab Al-Shaer, Qi Duan, Jafar Haadi Jafarian. 310-327 [doi]
- Towards a Framework for Evaluating the Security of Physical-Layer Identification SystemsRyan M. Gerdes, Mani Mina, Thomas E. Daniels. 328-348 [doi]
- A Voice Spam Filter to Clean Subscribers' MailboxSeyed Amir Iranmanesh, Hemant Sengar, Haining Wang. 349-367 [doi]