Abstract is missing.
- Privacy Enhanced Technologies: Methods - Markets - MisuseHannes Federrath. 1-9 [doi]
- Sec-Shield: Security Preserved Distributed Knowledge Management Between Autonomous DomainsPetros Belsis, Stefanos Gritzalis, Apostolos Malatras, Christos Skourlas, Ioannis Chalaris. 10-19 [doi]
- Protection Mechanisms Against Phishing AttacksKlaus Plößl, Hannes Federrath, Thomas Nowey. 20-29 [doi]
- Dropout-Tolerant TTP-Free Mental PokerJordi Castellà-Roca, Francesc Sebé, Josep Domingo-Ferrer. 30-40 [doi]
- A Self-healing Mechanism for an Intrusion Tolerance SystemBumjoo Park, Kiejin Park, Sungsoo Kim. 41-49 [doi]
- Protecting Online Rating Systems from Unfair RatingsJianshu Weng, Chunyan Miao, Angela Goh. 50-59 [doi]
- Anonymous Payment in a Fair E-Commerce Protocol with Verifiable TTPMagdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger. 60-69 [doi]
- Designing Secure E-Tendering SystemsRong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd. 70-79 [doi]
- A Multilateral Secure Payment System for Wireless LAN HotspotsStephan Groß, Sabine Lein, Sandra Steinbrecher. 80-89 [doi]
- Secure Group Communications over Combined Wired and Wireless NetworksJunghyun Nam, Seungjoo Kim, Dongho Won. 90-99 [doi]
- A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction PseudonymsOliver Jorns, Oliver Jung, Julia Gross, Sandford Bessler. 100-109 [doi]
- Making Money with Mobile Qualified Electronic SignaturesHeiko Rossnagel, Denis Royer. 110-118 [doi]
- Efficient Certificate Revocation System Implementation: Huffman Merkle Hash Tree (HuffMHT)Jose L. Muñoz, Jordi Forné, Oscar Esparza, Manel Rey. 119-127 [doi]
- Secure Index Search for GroupsHyun-A Park, Jin Wook Byun, Dong-Hoon Lee. 128-140 [doi]
- Provision of Secure Policy Enforcement Between Small and Medium Governmental OrganizationsNikolaos Oikonomidis, Sergiu Tcaciuc, Christoph Ruland. 141-150 [doi]
- Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced SecurityChing Lin, Vijay Varadharajan, Yan Wang. 151-160 [doi]
- The Fuzzy and Dynamic Nature of TrustElizabeth Chang, Patricia Thomson, Tharam S. Dillon, Farookh Khadeer Hussain. 161-174 [doi]
- Towards an Ontology of TrustLea Viljanen. 175-184 [doi]
- An Improved Group Signature SchemeJianhong Zhang, Jiancheng Zou, YuMin Wang. 185-194 [doi]
- Efficient Member Revocation in Group Signature SchemesEun Young Choi, Hyun-Jeong Kim, Dong-Hoon Lee. 195-205 [doi]
- Conditional Digital SignaturesMarek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski. 206-215 [doi]
- A Mediated Proxy Signature Scheme with Fast Revocation for Electronic TransactionsSeung-Hyun Seo, Kyung-Ah Shim, Sang Ho Lee. 216-225 [doi]
- Privacy Enforcement for IT Governance in Enterprises: Doing It for RealMarco Casassa Mont, Robert Thyne, Pete Bramhall. 226-235 [doi]
- An Adaptive Privacy Management System for Data RepositoriesMarco Casassa Mont, Siani Pearson. 236-245 [doi]
- Privacy Preserving Data Mining Services on the WebAyça Azgin Hintoglu, Yücel Saygin, Salima Benbernou, Mohand-Said Hacid. 246-255 [doi]
- Reading Your Keystroke: Whose Mail Is It?Sylvia Mercado Kierkegaard. 256-265 [doi]
- A Novel Construction of Two-Party Private Bidding Protocols from Yao s Millionaires ProblemHuafei Zhu, Feng Bao. 266-273 [doi]
- An Improved Double Auction Protocol Against False BidsJungHoon Ha, Jianying Zhou, Sang-Jae Moon. 274-287 [doi]
- An Investigation of Dispute Resolution Mechanisms on Power and Trust: A Domain Study of Online Trust in e-AuctionsGlenn Bewsell, Rodger Jamieson, Adrian Gardiner, Deborah Bunker. 288-298 [doi]
- A Secure Fingerprint Authentication System on an Untrusted Computing EnvironmentYongwha Chung, Daesung Moon, Taehae Kim, Sung Bum Pan. 299-310 [doi]
- Security Enhancement for Password Authentication Schemes with Smart CardsEun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo. 311-320 [doi]
- Securing Operating System Services Based on Smart CardsLuigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti. 321-330 [doi]