Abstract is missing.
- Electrostatic Force Method: - Trust Management Method Inspired by the Laws of PhysicsKonrad Leszczynski, Maciej Zakrzewicz. 1-12 [doi]
- Exploiting Proxy-Based Federated Identity Management in Wireless Roaming AccessDiana Berbecaru, Antonio Lioy, Marco Domenico Aime. 13-23 [doi]
- Privacy-Preserving Statistical Analysis on Ubiquitous Health DataGeorge Drosatos, Pavlos S. Efraimidis. 24-36 [doi]
- A Safety-Preserving Mix Zone for VANETsFlorian Scheuer, Karl-Peter Fuchs, Hannes Federrath. 37-48 [doi]
- A Secure Smartphone Applications Roll-out SchemeAlexios Mylonas, Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis. 49-61 [doi]
- Privacy Preserving Tree Augmented Naïve Bayesian Multi-party Implementation on Horizontally Partitioned DatabasesMaria Eleni Skarkala, Manolis Maragoudakis, Stefanos Gritzalis, Lilian Mitrou. 62-73 [doi]
- Secure Cloud Storage: Available Infrastructures and Architectures Review and EvaluationNikos Virvilis, Stelios Dritsas, Dimitris Gritzalis. 74-85 [doi]
- TRAP: Open Decentralized Distributed Spam FilteringNahid Shahmehri, David Byers, Rahul Hiran. 86-97 [doi]
- Best Effort and Practice Activation CodesGerhard de Koning Gans, Eric R. Verheul. 98-112 [doi]
- Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third PartiesJan Lehnhardt, Adrian Spalka. 113-124 [doi]
- Mining Roles from Web Application Usage PatternsNurit Gal-Oz, Yaron Gonen, Ran Yahalom, Ehud Gudes, Boris Rozenberg, Erez Shmueli. 125-137 [doi]
- A Mobility and Energy-Aware Hierarchical Intrusion Detection System for Mobile Ad Hoc NetworksEleni Darra, Christoforos Ntantogian, Christos Xenakis, Sokratis Katsikas. 138-149 [doi]
- An Evaluation of Anomaly-Based Intrusion Detection Engines for Mobile Ad Hoc NetworksChristoforos Panos, Christos Xenakis, Ioannis Stavrakakis. 150-160 [doi]
- Privacy Measures for Free Text Documents: Bridging the Gap between Theory and PracticeLiqiang Geng, Yonghua You, Yunli Wang, Hongyu Liu. 161-173 [doi]
- Towards Legal Privacy Risk Assessment and SpecificationEbenezer Paintsil. 174-185 [doi]
- Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and EncryptionJohannes Heurix, Thomas Neubauer. 186-197 [doi]
- Correcting a Delegation Protocol for GridsBenjamin Aziz. 198-209 [doi]
- Risk Assessment for Mobile DevicesThomas Lederm, Nathan L. Clarke. 210-221 [doi]