Issue 4/2011
Content (5 Articles)
Regular Contribution
Integrating identity-based and certificate-based authenticated key exchange protocols
Berkant Ustaoğlu
Regular Contribution
Data remanence effects on memory-based entropy collection for RFID systems
Nitesh Saxena, Jonathan Voris
Regular Contribution
Concrete- and abstract-based access control
Yacine Bouzida, Luigi Logrippo, Serge Mankovski
Regular Contribution
Do you really mean what you actually enforced?
Nataliia Bielova, Fabio Massacci
Regular Contribution
Using templates to distinguish multiplications from squaring operations
Neil Hanley, Michael Tunstall, William P. Marnane