Abstract is missing.
- Untraceability of RFID ProtocolsTon van Deursen, Sjouke Mauw, Sasa Radomirovic. 1-15 [doi]
- A Graphical PIN Authentication Mechanism with Applications to Smart Cards and Low-Cost DevicesLuigi Catuogno, Clemente Galdi. 16-35 [doi]
- Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of InformationMatthew Judge, Paul Williams, Yong Kim, Barry E. Mullins. 36-48 [doi]
- Probabilistic Identification for Hard to Classify ProtocolElie Bursztein. 49-63 [doi]
- A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain BuildupChrister Andersson, Markulf Kohlweiss, Leonardo A. Martucci, Andriy Panchenko. 64-77 [doi]
- Availability for DHT-Based Overlay Networks with Unidirectional RoutingJan Seedorf, Christian Muus. 78-91 [doi]
- Network Smart Card Performing U(SIM) Functionalities in AAA Protocol ArchitecturesJoaquín Torres Márquez, Antonio Izquierdo, Mildrey Carbonell, José María Sierra. 92-105 [doi]
- Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs)Gilles Guette, Ciarán Bryce. 106-116 [doi]
- Algebra for Capability Based Attack CorrelationNavneet Kumar Pandey, S. K. Gupta, Shaveta Leekha. 117-135 [doi]
- On the BRIP Algorithms Security for RSAFrederic Amiel, Benoit Feix. 136-149 [doi]