Ensuring security in depth based on heterogeneous network security technologies Meharouech SourourBouhoula AdelAbbes Tarek Regular Contribution 24 March 2009 Pages: 233 - 246
Listega: list-based steganography methodology Abdelrahman Desoky Regular Contribution 11 April 2009 Pages: 247 - 261
Redistributing time-based rights between consumer devices for content sharing in DRM system Sangho LeeJong KimSung Je Hong regular contribution 29 May 2009 Pages: 263 - 273
A comprehensive simulation tool for the analysis of password policies Richard ShayElisa Bertino Regular Contribution 12 June 2009 Pages: 275 - 289
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization Hristo KoshutanskiAliaksandr LazouskiPaolo Mori Regular Contribution 16 June 2009 Pages: 291 - 314