Volume 1, Number 1, January / February 2008 Editorials
Volume 1, Number 2, March / April 2008 Editorials
, Ralf Hauser
: Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks.
, Yang Xiao
: Retrieving knowledge from auditing log-files for computer and network forensics and accountability.
Volume 1, Number 3, May / June 2008 Guest Editorials
, Zonghua Zhang
, Rongxing Lu
: Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal.
Volume 1, Number 4, July / August 2008
Volume 1, Number 5, September / October 2008 Guest Editorials
, Ibrahim Khalil
: Enforcing secured ECG transmission for realtime telemonitoring: A joint encoding, compression, encryption mechanism.
, Yu Cai
: Secure authentication and authorization design for rural-based healthcare institutions.
Volume 1, Number 6, November / December 2008 Guest Editorials