Integrating identity-based and certificate-based authenticated key exchange protocols Berkant Ustaoğlu Regular Contribution 28 May 2011 Pages: 201 - 212
Data remanence effects on memory-based entropy collection for RFID systems Nitesh SaxenaJonathan Voris Regular Contribution 07 July 2011 Pages: 213 - 222
Concrete- and abstract-based access control Yacine BouzidaLuigi LogrippoSerge Mankovski Regular Contribution 14 July 2011 Pages: 223 - 238
Do you really mean what you actually enforced? Nataliia BielovaFabio Massacci Regular Contribution 24 June 2011 Pages: 239 - 254
Using templates to distinguish multiplications from squaring operations Neil HanleyMichael TunstallWilliam P. Marnane Regular Contribution 27 May 2011 Pages: 255 - 266