Abstract is missing.
- Efficient and Effective Buffer Overflow Protection on ARM ProcessorsRaoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens. 1-16 [doi]
- Efficient Entropy Estimation for Mutual Information Analysis Using B-SplinesAlexandre Venelli. 17-30 [doi]
- A Probabilistic Diffusion Scheme for Anomaly Detection on SmartphonesTansu Alpcan, Christian Bauckhage, Aubrey-Derrick Schmidt. 31-46 [doi]
- A Smart Card Implementation of the McEliece PKCFalko Strenzke. 47-59 [doi]
- Evaluation Metrics of Physical Non-invasive SecurityHuiyun Li, Keke Wu, Fengqi Yu, Hai Yuan. 60-75 [doi]
- Trust in Peer-to-Peer Content Distribution ProtocolsNicolai Kuntze, Carsten Rudolph, Andreas Fuchs. 76-89 [doi]
- Generic Constructions of Biometric Identity Based Encryption SystemsNeyire Deniz Sarier. 90-105 [doi]
- Design and Analysis of a Generalized Canvas ProtocolMarián Novotný. 106-121 [doi]
- Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed SignaturesMichael Braun, Ulrike Meyer, Susanne Wetzel. 122-137 [doi]
- Practical Schemes for Privacy and Security Enhanced RFIDJaap-Henk Hoepman, Rieks Joosten. 138-153 [doi]
- MoteAODV - An AODV Implementation for TinyOS 2.0Werner Backes, Jared Cordasco. 154-169 [doi]
- Random Number Generation Based on FingerprintsShkodran Gerguri, Václav Matyás Jr., Zdenek Ríha, Ludek Smolík. 170-182 [doi]
- Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAMLSergio Sánchez García, Ana Gómez Oliva. 183-198 [doi]
- Fraud Detection for Voice over IP Services on Next-Generation NetworksIgor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia Bringas. 199-212 [doi]
- Proxy Smart Card SystemsGiuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti. 213-220 [doi]
- Can We Support Applications Evolution in Multi-application Smart Cards by Security-by-Contract?Nicola Dragoni, Olga Gadyatskaya, Fabio Massacci. 221-228 [doi]
- Website Credential Storage and Two-Factor Web Authentication with a Java SIMJonathan Hart, Konstantinos Markantonakis, Keith Mayes. 229-236 [doi]
- Attribute-Based Encryption with Break-GlassAchim D. Brucker, Helmut Petritsch, Stefan G. Weber. 237-244 [doi]
- On the Security of a Two-Factor Authentication SchemeLuigi Catuogno, Clemente Galdi. 245-252 [doi]
- The Design of Secure and Efficient P2PSIP Communication SystemsXianghan Zheng, Vladimir A. Oleshchuk. 253-260 [doi]
- Novel FPGA-Based Signature Matching for Deep Packet InspectionNitesh B. Guinde, Sotirios G. Ziavras. 261-276 [doi]
- Towards Electrical, Integrated Implementations of SIMPL SystemsUlrich Rührmair, Qingqing Chen, Martin Stutzmann, Paolo Lugli, Ulf Schlichtmann, György Csaba. 277-292 [doi]
- A Very Compact Hardware Implementation of the KASUMI Block CipherDai Yamamoto, Kouichi Itoh, Jun Yajima. 293-307 [doi]
- Secure and Usable Out-Of-Band Channels for ::::Ad Hoc:::: Mobile Device InteractionsRonald Kainda, Ivan Flechais, A. W. Roscoe. 308-315 [doi]
- Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and AssertionsJohannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner. 316-323 [doi]
- Security Analysis of Mobile Phones Used as OTP GeneratorsHåvard Raddum, Lars Hopland Nestås, Kjell Jørgen Hole. 324-331 [doi]
- An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor NetworksOscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater. 332-339 [doi]
- The Market Failure of Anonymity ServicesHeiko Rossnagel. 340-354 [doi]
- Exploiting Node Mobility for Coordinating Data Usage in Crisis ScenariosGiovanni Russello, Enrico Scalavino. 355-367 [doi]
- Predicting and Preventing Insider Threat in Relational Database SystemsQussai Yaseen, Brajendra Panda. 368-383 [doi]