The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 04 - July/August (vol. 6)
ISSN: 1540-7993

Second-Generation RFID (Abstract)

A. Razaq , City Univ. of Hong Kong, Hong Kong
Wai Tong Luk , City Univ. of Hong Kong, Hong Kong
Kam Man Shum , City Univ. of Hong Kong, Hong Kong
Lee Ming Cheng , City Univ. of Hong Kong, Hong Kong
Kai Ning Yung , City Univ. of Hong Kong, Hong Kong
pp. 21-27
From the Editors
Interview
News Briefs

News Briefs (HTML)

Brandi Ortega , staff writer
pp. 11-13
Wireless Network Security

Open Wireless Networks on University Campuses (Abstract)

Hallvar Helleseth , Avenir AS
Andr? N. Klingsheim , Department of Informatics, University of Bergen
Lars-Helge Netland , Department of Informatics, University of Bergen
Jan B. Henriksen , Department of Informatics, University of Bergen
Kjell J. Hole , Department of Informatics, University of Bergen
Yngve Espelid , Bouvet ASA
pp. 14-20
Air Interface Protocols

Second-Generation RFID (Abstract)

Abdul (Ali) Razaq , City University of Hong Kong
Lee Ming Cheng , City University of Hong Kong
Wai Tong Luk , City University of Hong Kong
Kai Ning Yung , City University of Hong Kong
Kam Man Shum , City University of Hong Kong
pp. 21-27
Sensor Networks

Transactional Confidentiality in Sensor Networks (Abstract)

Deirdre K. Mulligan , University of California, Berkeley
Shankar Sastry , University of California, Berkeley
Sergio Bermudez , Cornell University
Tanya Roosta , University of California, Berkeley
Sameer Pai , Cornell University
Marci Meingast , University of California, Berkeley
Stephen B. Wicker , Cornell University
pp. 28-35
Secure Authentication

Remote Client Authentication (Abstract)

Thorsten Kramp , IBM's Zurich Research Laboratory
Thomas Weigold , IBM's Zurich Research Laboratory
Michael Baentsch , IBM's Zurich Research Laboratory
pp. 36-43
Usage Control

Usage Control Enforcement: Present and Future (Abstract)

Christian Schaefer , DoCoMo Euro-Labs
Florian Sch? , RUAG Electronics
Alexander Pretschner , Swiss Institute of Technology
Manuel Hilty , AdNovum Informatik AG
Thomas Walter , DoCoMo Euro-Labs
pp. 44-53
Education

Learning by Failing (and Fixing) (Abstract)

Gunnar Ren? ?ie , Norwegian University of Science and Technology
Lillian R?stad , Norwegian University of Science and Technology
pp. 54-56
Privacy Interests

Heuristics for De-identifying Health Data (Abstract)

Khaled El Emam , Children's Hospital of Eastern Ontario Research Institute
pp. 58-61
Crypto Corner

The Virtues of Mature and Minimalist Cryptography (Abstract)

Justin Troutman , Extorque Cryptographic Services
pp. 62-65
Secure Systems

Insiders Behaving Badly (Abstract)

Carla Bulford , Jeffrey Hunker Associates
Jeffrey Hunker , Carnegie Mellon University
Joel Predd , RAND
pp. 66-70
Emerging Standards
For Good Measure

Strong Attractors (Abstract)

Daniel G. Conway , Kelley School at Indiana University
pp. 78-79
Clear Text
89 ms
(Ver )