Analysis and application of Bio-Inspired Multi-Net Security Model Ruijuan ZhengMingchuan ZhangJiexin Pu Regular Contribution 02 September 2009 Pages: 1 - 17
Content-based image authentication: current status, issues, and challenges Shui-Hua HanChao-Hsien Chu Regular Contribution 08 October 2009 Pages: 19 - 32
Temporarily hidden bit commitment and lottery applications David M. GoldschlagStuart G. StubblebinePaul F. Syverson Regular Contribution 19 November 2009 Pages: 33 - 50
A column dependency-based approach for static and dynamic recovery of databases from malicious transactions Anindya ChakrabortyArun K. MajumdarShamik Sural Regular Contribution 22 November 2009 Pages: 51 - 67
Fractional biometrics: safeguarding privacy in biometric applications Duncan BaylyMaurice CastroKathy Horadam Regular Contribution 01 December 2009 Pages: 69 - 82