Abstract is missing.
- On the Unobservability of a Trust Relation in Mobile Ad Hoc NetworksOlivier Heen, Gilles Guette, Thomas Genet. 1-11 [doi]
- A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent SystemsMarc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-DÃaz. 12-27 [doi]
- Privacy-Aware Location Database Service for Granular QueriesShinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima. 28-37 [doi]
- Algebraic Attacks on RFID ProtocolsTon van Deursen, Sasa Radomirovic. 38-51 [doi]
- Anti-counterfeiting Using Memory SpotsHelen Balinsky, Edward McDonnell, Liqun Chen, Keith A. Harrison. 52-67 [doi]
- On Second-Order Fault Analysis Resistance for CRT-RSA ImplementationsEmmanuelle Dottax, Christophe Giraud, Matthieu Rivain, Yannick Sierra. 68-83 [doi]
- Measurement Analysis When Benchmarking Java Card PlatformsPierre Paradinas, Julien Cordry, Samia Bouzefrane. 84-94 [doi]
- Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java CardHendrik Tews, Bart Jacobs. 95-111 [doi]
- Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor NetworksChristian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich. 112-127 [doi]
- Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay NetworksJ. A. M. Naranjo, J. A. López-Ramos, L. G. Casado. 128-142 [doi]
- Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear InfrastructureKeith M. Martin, Maura B. Paterson. 143-152 [doi]
- PKIX Certificate Status in Hybrid MANETsJose L. Muñoz, Oscar Esparza, Carlos Gañán, Javier Parra-Arnau. 153-166 [doi]