Table of Contents, vol 2, no 2&3, year 2009
Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy
Heikki Kokkinen, Nokia Research Center, Finland
Mikko V. J. Heikkinen, TKK Helsinki University of Technology, Finland
Markus Miettinen, Nokia Research Center, Finland
A Holistic Approach to Open Source VoIP Security: Results from the EUX2010SEC Project
Lothar Fritsch, Norsk Regnesentral, Norway
Arne-Kristian Groven, Norsk Regnesentral, Norway
Lars Strand, Norsk Regnesentral, Norway
Wolfgang Leister, Norsk Regnesentral, Norway
Anders Moen Hagalisletto, Norsk Regnesentral, Norway
Encoding Subsystem Codes
Pradeep Sarvepalli, Department of Physics and Astronomy, University of British Columbia, Canada
Andreas Klappenecker, Department of Computer Science and Engineering, Texas A&M University, USA
Security and User Aspects in the Design of the Future Trusted Ambient Networked Systems
Seppo Heikkinen, Department of Communications Engineering, Tampere University of Technology, Finland
Kari Heikkinen, Communications Software Laboratory, Lappeenranta University of Technology, Finland
Sari Kinnari, Department of Communications Engineering, Tampere University of Technology, Finland
Networking and Security Issues for Remote Gaming: The Approach of G@L
Christos Bouras, Research Academic Computer Technology Institute, Greece
Vassilis Poulopoulos, Research Academic Computer Technology Institute, Greece
Vassilis Tsogkas, Research Academic Computer Technology Institute, Greece
Distributed GIS Approach for Flood Risk Assessment
Rifaat Abdalla, York University, Canada
A Legal Evaluation of Pseudonymization Approaches
Thomas Neubauer, Vienna University of Technology, Austria
Mathias Kolb, Secure Business Austria, Austria
Business Intelligence Based Malware Log Data Analysis as an Instrument for Security Information and Event Management
Tobias Hoppe, Ruhr-University of Bochum, Germany
Alexander Pastwa, Steria Mummert Consulting, Germany
Sebastian Sowa, Ruhr-University of Bochum, Germany
Enhancing Information Reliability through Backwards Propagation Of Distrust
Panagiotis Metaxas, Wellesley College, USA
Assuring Quality in Vulnerability Reports for Security Risk Analysis
Deepak Subramanian, Nanyang Technological University, Singapore
Le Ha Thanh, Nanyang Technological University, Singapore
Peter Kok Keong Loh, Nanyang Technological University, Singapore
Security Analysis of Private Data Enquiries in Erlang
Florian Kammuller, Technische Universitat Berlin, Germany
Reiner Kammuller, Universitat Siegen, Germany
An Integrated System for Intelligence, Surveillance and Reconnaissance (ISR)
Barbara Essendorfer, Fraunhofer IITB, Germany
Eduardo Monari, Fraunhofer IITB, Germany
Heiko Wanning, Fraunhofer IITB, Germany
Design Patterns for a Systemic Privacy Protection
Kajetan Dolinar, Security Technology Competence Centre (SETCCE), Slovenia
Jan Porekar, Security Technology Competence Centre (SETCCE), Slovenia
Aleksej Jerman Blazic, Security Technology Competence Centre (SETCCE), Slovenia
Threats to the Swarm: Security Considerations for Swarm Robotics
Fiona Higgins, University of London, UK
Allan Tomlinson, University of London, UK
Keith M. Martin, University of London, UK
download vol 2, no 2&3, year 2009