Abstract is missing.
- Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor NetworksKeunwoo Rhee, Byunghee Lee, Dongho Won, Hac Yun Na, Seungjoo Kim. 1-4 [doi]
- Protecting Kernel Data through Virtualization TechnologyDonghai Tian, Deguang Kong, Changzhen Hu, Peng Liu 0005. 5-10 [doi]
- An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OSJonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard. 11-16 [doi]
- Towards Sybil Resistant Authentication in Mobile Ad Hoc NetworksSarosh Hashmi, John Brooke. 17-24 [doi]
- Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring SystemReijo M. Savola, Petri Heinonen. 25-34 [doi]
- Improving the Efficiency of a Highly-Used Access Control SchemeJin Tamura. 35-39 [doi]
- Forthcoming Aggregating Intrusion Detection System Alerts FrameworkHomam El-Taj, Omar Abouabdalla, Ahmed M. Manasrah, Ahmed Al-Madi, Muhammad Imran Sarwar, Sureswaran Ramadass. 40-44 [doi]
- Strategies for Managed Software Integrity ProtectionManfred Schäfer, Wolf-Dietrich Moeller. 45-50 [doi]
- Security Analysis of Firewall Rule Sets in Computer NetworksBilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar. 51-56 [doi]
- SOA-Based Security Governance MiddlewarePierre de Leusse, Theo Dimitrakos. 57-62 [doi]
- A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless EnvironmentsTewfiq El Maliki, Jean-Marc Seigneur. 63-68 [doi]
- Prospect of Fine Grain Dynamic Memory Access Control with ProfilingDongkyun Ahn, Gyungho Lee. 69-74 [doi]
- Identity Management without RevocationAnders Fongen. 75-81 [doi]
- Heuristic Search in Encrypted GraphsPierluigi Failla. 82-87 [doi]
- Performance Evaluation of SNR Estimation Methods in Forensic Speaker RecognitionFrancesco Beritelli, Salvatore Casale, Rosario Grasso, Andrea Spadaccini. 88-92 [doi]
- A Statistical Approach to Biometric Identity Verification Based on Heart SoundsFrancesco Beritelli, Andrea Spadaccini. 93-96 [doi]
- Industrial Sensor Network Security ArchitectureRainer Falk, Hans-Joachim Hof. 97-102 [doi]
- Blind Detectors in Spread Spectrum Watermarking for Interference ReductionCagatay Karabat, Mehmet Keskinoz. 103-108 [doi]
- Analysis of Strongly and Weakly Coupled Management Systems in Information SecurityWolfgang Boehmer. 109-116 [doi]
- Shifting the Paradigm: Training Undergraduate Students in Software SecurityCynthia Y. Lester. 117-122 [doi]
- BlogCrypt: Private Content Publishing on the WebTamás Paulik, Ádám Máté Földes, Gábor György Gulyás. 123-128 [doi]
- Verifying Hotspot Quality User Rating with Certified QoS EvidenceXavier Titi, Jean-Marc Seigneur. 129-134 [doi]
- RBAC+: Dynamic Access Control for RBAC-Administered Web-Based DatabasesAhlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene. 135-140 [doi]
- Socio-technical Security Assessment of a VoIP SystemPekka Pietikäinen, Kati Karjalainen, Juha Röning, Juhani Eronen. 141-147 [doi]
- An Analysis of the Asprox BotnetRavishankar Borgaonkar. 148-153 [doi]
- Eliciting Information on the Vulnerability Black Market from InterviewsJaziar Radianti. 154-159 [doi]
- Cascaded Simple Filters for Accurate and Lightweight Email-Spam DetectionMasaru Takesue. 160-165 [doi]
- Exploiting the x86 Architecture to Derive Virtual Machine State InformationJonas Pfoh, Christian Schneider, Claudia Eckert. 166-175 [doi]
- Patch Scheduling for Risk Exposure Mitigation under Service Disruption ConstraintsPraveen Bommannavar, Nicholas Bambos. 176-181 [doi]
- Discovery of Invariant Bot Behavior through Visual Network Monitoring SystemAlireza Shahrestani, Maryam Feily, Rodina Ahmad, Sureswaran Ramadass. 182-188 [doi]
- A Study of a Social Behavior inside the Online Black MarketsJaziar Radianti. 189-194 [doi]
- Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the ThreatThomas Ormerod, Lingyu Wang, Mourad Debbabi, Amr M. Youssef, Hamad Binsalleeh, Amine Boukhtouta, Prosenjit Sinha. 195-200 [doi]
- A Shuffling Scheme with Strict and Strong SecurityKun Peng, Feng Bao. 201-206 [doi]
- Biometric Transaction Authentication ProtocolDaniel Hartung, Christoph Busch. 207-215 [doi]
- Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule ImagesAbdel Alim Kamal, Amr M. Youssef. 216-220 [doi]
- Analyzing the DPA Leakage of the Masked S-box via Digital Simulation and Reducing the Leakage by Inserting Delay CellsSedat Soydan. 221-227 [doi]
- An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing UnitFan Wu, Chung-Han Chen, Hira N. Narang. 228-233 [doi]
- An Efficient Vein Pattern-Based Recognition SystemMohit Soni, Sandesh Gupta, M. S. Rao, Phalguni Gupta. 234-239 [doi]
- Detection Methods Improving Reliability of Automatic Human Tracking SystemHiroto Kakiuchi, Takao Kawamura, Toshihiko Sasama, Kazunori Sugahara. 240-246 [doi]
- Universal Bluetooth Access Control and Security System for e-Keys EnviromentsFrancisco José Bellido Outeiriño, Pedro Canales Aranda, José Luis de la Cruz Fernández, Benito Pérez Jarauta. 247-250 [doi]
- An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance EvaluationAli Ahmed 0001, Ning Zhang. 251-260 [doi]
- A Security Control Architecture for SOAP-Based ServicesBoulares Ouchenne, Ousmane Koné. 261-265 [doi]
- Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-APIDanilo Valeros Bernardo, Doan Hoang. 266-272 [doi]
- Protection of a Shared HPC ClusterMathieu Blanc, Jérémy Briffaut, Thibault Coullet, Maxime Fonda, Christian Toinard. 273-279 [doi]
- Towards a Structural Secure Design ProcessS. Hasan Mirjalili, Arjen K. Lenstra. 280-286 [doi]