Adapting Public Key Infrastructures to the Mobile Environment N T TraskS A Jaweed OriginalPaper Pages: 76 - 80
Concert IP Secure — a Managed Firewall and VPN Service G ShorrockC Awdry OriginalPaper Pages: 99 - 106
Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security M A SasseS BrostoffD Weirich OriginalPaper Pages: 122 - 131
Interworking between SDH and OTN-Based Transport Networks A McGuireA J Flavin OriginalPaper Pages: 143 - 151