Abstract is missing.
- Evaluating a New Reputation Algorithm With Consideration For FairnessAdam Wierzbicki. 1-6 [doi]
- Four security certification levels for IT Managers and Staff in the Public SectorSergejus Sosunovas, Olegas Vasilecas. 7-11 [doi]
- A Survey of User-centric Identity Management TechnologiesTewfiq El Maliki, Jean-Marc Seigneur. 12-17 [doi]
- SemID: Combining Semantics with Identity ManagementMohammad M. R. Chowdhury, Juan Miguel Gómez, Josef Noll, Ángel García-Crespo. 18-23 [doi]
- Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP ConnectionsMarga Nácher, Carlos Miguel Tavares Calafate, Juan-Carlos Cano, Pietro Manzoni. 24-29 [doi]
- Trustworthily Forwarding Sensor Networks Information to the InternetOlivier Powell, Jean-Marc Seigneur, Luminita Moraru. 30-35 [doi]
- Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet ThreatsNikolaos Chatzis. 36-41 [doi]
- A Formal Approach to prevent Attacks on Mobile Agent SystemsMonia Loulou, Mohamed Tounsi, Ahmed Hadj Kacem, Mohamed Jmaiel. 42-47 [doi]
- Increasing Detection Rate of User-to-Root Attacks Using Genetic AlgorithmsZorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz, Atta Badii. 48-53 [doi]
- A Scheme for Protecting the Information Leakage Via Portable DevicesMasaru Takesue. 54-59 [doi]
- A Quasi-Lossless Data Embedding Technique Based on Euclidean Distance CalculationNoura A. Saleh, Hoda N. Boghdady, Samir I. Shaheen, Ahmed M. Darwish. 60-65 [doi]
- Classification of Privacy Enhancing Technologies on Life-cycle of InformationYeonjung Kang, Hyangjin Lee, Kilsoo Chun, Junghwan Song. 66-70 [doi]
- Chaos-Based Cryptography: End of the Road?Daniel-Ioan Curiac, Daniel Iercan, Octavian Dranga, Florin Dragan 0002, Ovidiu Banias. 71-76 [doi]
- Long-term storage and management of encrypted biomedical data in real scenariosIgnacio Blanquer, Vicente Hernández, Damià Segrelles, Erik Torres. 77-82 [doi]
- Semantically supported Authentication and Privacy in Social NetworksJosef Noll, Mohammad M. R. Chowdhury, György Kálmán, Juan Miguel Gómez. 83-88 [doi]
- Data Preparation for User Profiling from Traffic LogMarek Kumpost. 89-94 [doi]
- SECUAREA: Security in physical and logical areasLourdes López, Luis Redondo, José-Fernán Martínez, Manuel Ramiro, Vicente Hernández, Francisco A. B. Bonilla, Fermín Bretón. 95-100 [doi]
- Robust sensor self-initialization: Whispering to avoid intrudersCarlos Nuno da Cruz Ribeiro. 101-106 [doi]
- Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security ServicesXiaomeng Su, Damiano Bolzoni, Pascal van Eck. 107-114 [doi]
- Evaluation of Deviating Alerts coming from Behavioral Intrusion Detection SystemJacques Saraydaryan, Véronique Legrand, Stéphane Ubéda. 115-121 [doi]
- A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environmentsJorge Belenguer, Carlos Miguel Tavares Calafate. 122-127 [doi]
- Dynamic environment evaluation for reliable AmI applications based on untrusted sensorPedro Malagón, Juan Carlos Vallejo, José Manuel Moya. 128-131 [doi]
- Distributed Identity Management Model for Digital EcosystemsHristo Koshutanski, Mihaela Ion, Luigi Telesca. 132-138 [doi]
- Security made easy: Achieving user-friendly communication protection in ad-hoc situationsJens Heider, Julian Schütte. 139-144 [doi]
- Adding Value to TCP/IP Based Information exchange Security by Specialized HardwareVukasin Pejovic, Slobodan Bojanic, Carlos Carreras. 145-150 [doi]
- Migrating a HoneyDepot to HardwareVukasin Pejovic, Ivana Kovacevic, Slobodan Bojanic, Corado Leita, Jelena Popovic, Octavio Nieto-Taladriz. 151-156 [doi]
- Automatic Configuration of Ad-Hoc Networks: Establishing unique IP Link-Local AddressesRaquel Lacuesta Gilaberte, Lourdes Peñalver Herrero. 157-162 [doi]
- Route Investigation for Secure Routing in Mobile Ad-hoc NetworksHan-Shik Kim, Byung-Seok Kang, Sangheon Pack, Chul-Hee Kang. 163-168 [doi]
- A Proposal to Improve IKEv2 negotiationLari Iso-Anttila, Jorma Ylinen, Pekka Loula. 169-174 [doi]
- Temporal Verification in Secure Group Communication System DesignBenjamin Fontan, Sara Mota, Pierre de Saqui-Sannes, Thierry Villemur. 175-180 [doi]
- Towards a Comprehensive View of Secure Software EngineeringMehrez Essafi, Lamia Labed Jilani, Henda Hajjami Ben Ghézala. 181-186 [doi]
- A Software Architecture for Automatic Security Policy Enforcement in Distributed SystemsHédi Hamdi, Adel Bouhoula, Mohamed Mosbah. 187-192 [doi]
- Identity-Based Cryptosystems for Enhanced Deployment of OSGi BundlesPierre Parrend, Samuel Galice, Stéphane Frénot, Stéphane Ubéda. 193-200 [doi]
- Formal Verification of Business Workflows and Role Based Access Control SystemsArnaud Dury, Sergiy Boroday, Alexandre Petrenko, Volkmar Lotz. 201-210 [doi]
- A fast and elastic fingerprint matching algorithm using minutiae-centered circular regionsHaiyong Chen, Hongwei Sun, Kwok-Yan Lam. 211-215 [doi]
- AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User EnvironmentSomchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt. 216-221 [doi]