W. Neudorfer, L. Marinos, I. Schaumüller, and .. , Bichl VoIP Security Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks, p.130

G. Zhang, S. Fischer-hübner, S. Proxies, and .. , New Reflectors in the Internet, p.142
URL : https://hal.archives-ouvertes.fr/hal-01056382

G. Zhang, J. Jaen-pallares, Y. Rebahi, S. Fischer, and .. , Hübner Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal, p.154

P. Battistello and C. , Delétré Biometrics Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication, p.166

S. Rass, D. Schuller, and C. , Kollmitzer Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction, p.178

K. Kümmel, C. Vielhauer, T. Scheidat, D. Franke, J. Dittmann-privacy-preserving-key-generation-for-iris-biometrics et al., 191 Christian Rathgeb and Andreas Uhl Applied Cryptography Generalizations and Extensions of Redactable Signatures with Applications to Electronic

D. Slamanig and S. , Rass Table of Contents XIII Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption, p.214

M. Huber, M. Mulazzani, and .. , and Edgar Weippl Secure Communication Using Identity Based Encryption, p.256

S. Roschke and L. Ibraimi, Feng Cheng, and Christoph Meinel Anonymous Client Authentication for Transport Layer Security, p.268