Abstract is missing.
- On Enhancement of 'Share The Secret' Scheme for Location PrivacyCostas Delakouridis, Christos Anagnostopoulos. 1-16 [doi]
- New Attacks against Transformation-Based Privacy-Preserving Linear ProgrammingPeeter Laud, Alisa Pankova. 17-32 [doi]
- Maintaining Database Anonymity in the Presence of QueriesRyan Riley, Chris Clifton, Qutaibah M. Malluhi. 33-48 [doi]
- A Probabilistic Framework for Distributed Localization of Attackers in MANETsAlessandra De Benedictis, Behzad Koosha, Massimiliano Albanese, Valentina Casola. 49-64 [doi]
- MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage VulnerabilitiesMauro Conti, Nicola Dragoni, Sebastiano Gottardo. 65-81 [doi]
- Evaluating the Manageability of Web Browsers ControlsAlexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis. 82-98 [doi]
- Using Interpolation for the Verification of Security ProtocolsMarco Rocchetto, Luca Viganò, Marco Volpe, Giacomo Dalle Vedove. 99-114 [doi]
- RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced DatabasesLil María Rodríguez-Henríquez, Debrup Chakraborty. 115-130 [doi]
- Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi NamesAna Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas. 131-143 [doi]
- Probabilistic Cost Enforcement of Security PoliciesYannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset. 144-159 [doi]
- Selective Disclosure in Datalog-Based Trust ManagementNik Sultana, Moritz Y. Becker, Markulf Kohlweiss. 160-175 [doi]
- Towards a Detective Approach to Process-Centered ResilienceThomas Koslowski, Christian Zimmermann. 176-190 [doi]
- IF-Net: A Meta-Model for Security-Oriented Process SpecificationThomas Stocker, Frank Böhr. 191-206 [doi]
- Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram ModulationJavier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux. 207-222 [doi]
- Weighted-Sum Fragile Watermarking in the Karhunen-Loève DomainMarco Botta, Davide Cavagnino, Victor Pomponiu. 223-234 [doi]