A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing (Abstract)
[Copyright notice] (PDF)
Table of contents (PDF)
list-reviewer (PDF)
Title Page i (PDF)
Title Page iii (PDF)
Preface (PDF)
Committee (PDF)
Comparison of Static Code Analysis Tools (Abstract)
Secrecy for Bounded Security Protocols without Freshness Check (Abstract)
List of Criteria for a Secure Computer Architecture (Abstract)
Detecting Man-in-the-Middle Attacks by Precise Timing (Abstract)
Enforcement of Security Properties for Dynamic MAC Policies (Abstract)
Survivability and Business Continuity Management System According to BS 25999 (Abstract)
Replay Attack of Dynamic Rights within an Authorised Domain (Abstract)
Phishing and Countermeasures in Spanish Online Banking (Abstract)
Modeling Role-Based Privacy in Social Networking Services (Abstract)
Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks (Abstract)
Secure Routing Approach for Unstructured P2P Systems (Abstract)
[Publisher's information] (PDF)
A Survey of Botnet and Botnet Detection (Abstract)
Forward Secure ID-Based Group Key Agreement Protocol with Anonymity (Abstract)
Analysis of a Password Strengthening Technique and Its Practical Use (Abstract)
Correlation Based Node Behavior Profiling for Enterprise Network Security (Abstract)
Author Index (PDF)