Abstract is missing.
- Trust Without IdentificationHoward Chivers. 1-2 [doi]
- Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc NetworksJin Wook Byun, Su-Mi Lee, Dong-Hoon Lee, Dowon Hong. 3-17 [doi]
- Enabling Secure Discovery in a Pervasive EnvironmentSlim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier. 18-31 [doi]
- Forward Secure Communication in Wireless Sensor NetworksSjouke Mauw, Ivo van Vessem, Bert Bos. 32-42 [doi]
- Low Rate DoS Attack to Monoprocess ServersGabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro. 43-57 [doi]
- Delegating Secure Logging in Pervasive Computing SystemsRafael Accorsi, Adolf Hohl. 58-72 [doi]
- Implementing Minimized Multivariate PKC on Low-Resource Embedded SystemsBo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen. 73-88 [doi]
- Higher Dependability and Security for Mobile ApplicationsHongxia Jin. 89-103 [doi]
- Tampering with Motes: Real-World Physical Attacks on Wireless Sensor NetworksAlexander Becher, Zinaida Benenson, Maximillian Dornseif. 104-118 [doi]
- The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security IssuesMichael Friedewald, Elena Vildjiounaite, Yves Punie, David Wright. 119-133 [doi]
- Profiles and Context Awareness for Mobile Users - A Middleware Approach Supporting Personal SecurityGerald Eichler, Matthias O. Will. 134-148 [doi]
- Privacy Sensitive Location Information Systems in Smart BuildingsJodie P. Boyer, Kaijun Tan, Carl A. Gunter. 149-164 [doi]
- Silent Cascade: Enhancing Location Privacy Without Communication QoS DegradationLeping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki. 165-180 [doi]
- Securing Information Gateways with Derivation-Constrained Access ControlUrs Hengartner, Peter Steenkiste. 181-195 [doi]
- Information Flow Control to Secure Dynamic Web Service CompositionDieter Hutter, Melanie Volkamer. 196-210 [doi]
- Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank FunctionsSiraj A. Shaikh, Christos K. Dimitriadis. 211-226 [doi]
- Attribute-Based Authentication Model for Dynamic Mobile EnvironmentsMichael J. Covington, Manoj R. Sastry, Deepak J. Manohar. 227-242 [doi]