Advances in Network and Information Security
Computing of Trust in Ad-Hoc Networks
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
On the Privacy Risks of Publishing Anonymized IP Network Traces
Secure Mobile Notifications of Civilians in Case of a Disaster
A Fair Anonymous Submission and Review System
Attribute Delegation Based on Ontologies and Context Information
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange
Enhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart
Perturbing and Protecting a Traceable Block Cipher
A New Encryption and Hashing Scheme for the Security Architecture for Microprocessors
Timed Release Cryptography from Bilinear Pairings Using Hash Chains
Compression of Encrypted Visual Data
Selective Encryption for Hierarchical MPEG
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods
A Flexible and Open DRM Framework
PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies
A Privacy Agent in Context-Aware Ubiquitous Computing Environments
Ensuring Privacy in Smartcard-Based Payment Systems: A Case Study of Public Metro Transit Systems
Attack Graph Based Evaluation of Network Security
Information Modeling for Automated Risk Analysis
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Author Index