The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 02 - March/April (vol. 5)
ISSN: 1540-7993
From the Editors

Trusted Computing in Context (HTML)

Fred Schneider , Associate Editor in Chief
pp. 4-5
News

News Briefs (HTML)

pp. 7-10
Interview
Malware

A Surprise Party (on Your Computer)? (HTML)

Iv? Arce , Core Security Technologies
pp. 15-16

Studying Bluetooth Malware Propagation: The BlueBag Project (HTML)

Claudio Merloni , Secure Network Srl
Stefano Zanero , Politecnico di Milano
Luca Carettoni , Secure Network Srl
pp. 17-25

Alien vs. Quine (Abstract)

Vanessa Gratzer , Universit? Paris II Panth?on-Assas
David Naccache , ?cole normale sup?rieure
pp. 26-31

Toward Automated Dynamic Malware Analysis Using CWSandbox (Abstract)

Thorsten Holz , University of Mannheim, Germany
Felix Freiling , University of Mannheim, Germany
Carsten Willems , University of Mannheim, Germany
pp. 32-39

Code Normalization for Self-Mutating Malware (Abstract)

Danilo Bruschi , Universit? degli Studi di Milano
Mattia Monga , Universit? degli Studi di Milano
Lorenzo Martignoni , Universit? degli Studi di Milano
pp. 46-54
Identity Management

Trust Negotiation in Identity Management (Abstract)

Elisa Bertino , Purdue University
Abhilasha Bhargav-Spantzel , Purdue University
Anna C. Squicciarini , Purdue University
pp. 55-63
Education

Common Body of Knowledge for Information Security (Abstract)

Marianthi Theoharidou , Athens University of Economics and Business
Dimitris Gritazalis , Athens University of Economics and Business
pp. 64-67
On The Horizon

Secure Communication without Encryption? (Abstract)

Keye Martin , US Naval Research Laboratory
pp. 68-71
Privacy Interests

Setting Boundaries at Borders: Reconciling Laptop Searches and Privacy (Abstract)

Jonathan Gilhen , Gowling Lafleur Henderson LLP
E. Michael Power , Gowling Lafleur Henderson LLP
Roland L. Trope , Trope and Schramm LLP
pp. 72-75
Crypto Corner

When Cryptographers Turn Lead into Gold (Abstract)

Patrick P. Tsang , Dartmouth College
pp. 76-79
Secure Systems
Digital Protection

South Korea's Way to the Future (Abstract)

Michael Lesk , Rutgers University
pp. 85-87
Building Security In
Emerging Standards

Infrastructure Standards for Smart ID Card Deployment (Abstract)

Philip Lee , Identity Alliance
Ramaswamy Chandramouli , US National Institute of Standards & Technology
pp. 92-96
83 ms
(Ver )