Predicting Trustworthiness for Component Software (Abstract)
Remote Management and Secure Application Development for Pervasive Home Systems Using JASON (Abstract)
Usage Control Reference Monitor Architecture (Abstract)
Secure Routing in Integrated Mobile Ad hoc Network (MANET)-Internet (Abstract)
A Survey on the Applicability of Trust Management Systems forWireless Sensor Networks (Abstract)
Location-aware Random Pair-wise Keys Scheme forWireless Sensor Networks (Abstract)
Towards effective Wireless Intrusion Detection in IEEE 802.11i (Abstract)
A New Certificate Signature for Pervasive Environment (Abstract)
A Security-by-Contract Architecture for Pervasive Services (Abstract)
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags (Abstract)
Storage-Awareness: RFID Private Authentication based on Sparse Tree (Abstract)
Secure Mobile RFID system against privacy and security problems (Abstract)
Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags (Abstract)
An Architecture for Secure VoIP and Collaboration Applications (Abstract)
Identity Based Private Matching (Abstract)
Author Index (PDF)