Token-based graphical password authentication John Charles GyorffyAndrew F. TappendenJames Miller Regular Contribution 02 October 2011 Pages: 321 - 336
Electronic retention: what does your mobile phone reveal about you? William Bradley GlissonTim StorerGeorge Grispos Regular Contribution 20 August 2011 Pages: 337 - 349
Solving identity delegation problem in the e-government environment Sergio Sánchez GarcíaAna Gómez OlivaIván Pau de la Cruz Regular Contribution 07 July 2011 Pages: 351 - 372
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability Qiong HuangGuomin YangWilly Susilo Regular Contribution 24 August 2011 Pages: 373 - 385
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks Josep M. MiretFrancesc Sebé Regular Contribution 12 August 2011 Pages: 387 - 389
Erratum to: Dynamic subtree tracing and its application in pay-TV systems Peter Roelse Erratum 09 July 2011 Pages: 391 - 391