Table of Contents, vol 2, no 2&3, year 2009

Post-Payment Copyright System versus Online Music Shop: Business Model and Privacy
Heikki Kokkinen, Nokia Research Center, Finland
Mikko V. J. Heikkinen, TKK Helsinki University of Technology, Finland
Markus Miettinen, Nokia Research Center, Finland

A Holistic Approach to Open Source VoIP Security: Results from the EUX2010SEC Project
Lothar Fritsch, Norsk Regnesentral, Norway
Arne-Kristian Groven, Norsk Regnesentral, Norway
Lars Strand, Norsk Regnesentral, Norway
Wolfgang Leister, Norsk Regnesentral, Norway
Anders Moen Hagalisletto, Norsk Regnesentral, Norway

Encoding Subsystem Codes
Pradeep Sarvepalli, Department of Physics and Astronomy, University of British Columbia, Canada
Andreas Klappenecker, Department of Computer Science and Engineering, Texas A&M University, USA

Security and User Aspects in the Design of the Future Trusted Ambient Networked Systems
Seppo Heikkinen, Department of Communications Engineering, Tampere University of Technology, Finland
Kari Heikkinen, Communications Software Laboratory, Lappeenranta University of Technology, Finland
Sari Kinnari, Department of Communications Engineering, Tampere University of Technology, Finland

Networking and Security Issues for Remote Gaming: The Approach of G@L
Christos Bouras, Research Academic Computer Technology Institute, Greece
Vassilis Poulopoulos, Research Academic Computer Technology Institute, Greece
Vassilis Tsogkas, Research Academic Computer Technology Institute, Greece

Distributed GIS Approach for Flood Risk Assessment
Rifaat Abdalla, York University, Canada

A Legal Evaluation of Pseudonymization Approaches
Thomas Neubauer, Vienna University of Technology, Austria
Mathias Kolb, Secure Business Austria, Austria

Business Intelligence Based Malware Log Data Analysis as an Instrument for Security Information and Event Management
Tobias Hoppe, Ruhr-University of Bochum, Germany
Alexander Pastwa, Steria Mummert Consulting, Germany
Sebastian Sowa, Ruhr-University of Bochum, Germany

Enhancing Information Reliability through Backwards Propagation Of Distrust
Panagiotis Metaxas, Wellesley College, USA

Assuring Quality in Vulnerability Reports for Security Risk Analysis
Deepak Subramanian, Nanyang Technological University, Singapore
Le Ha Thanh, Nanyang Technological University, Singapore
Peter Kok Keong Loh, Nanyang Technological University, Singapore

Security Analysis of Private Data Enquiries in Erlang
Florian Kammuller, Technische Universitat Berlin, Germany
Reiner Kammuller, Universitat Siegen, Germany

An Integrated System for Intelligence, Surveillance and Reconnaissance (ISR)
Barbara Essendorfer, Fraunhofer IITB, Germany
Eduardo Monari, Fraunhofer IITB, Germany
Heiko Wanning, Fraunhofer IITB, Germany

Design Patterns for a Systemic Privacy Protection
Kajetan Dolinar, Security Technology Competence Centre (SETCCE), Slovenia
Jan Porekar, Security Technology Competence Centre (SETCCE), Slovenia
Aleksej Jerman Blazic, Security Technology Competence Centre (SETCCE), Slovenia

Threats to the Swarm: Security Considerations for Swarm Robotics
Fiona Higgins, University of London, UK
Allan Tomlinson, University of London, UK
Keith M. Martin, University of London, UK

download vol 2, no 2&3, year 2009

 
Copyright (c) 2008-2012. IARIA, All rights reserved.