Toward a secure Kerberos key exchange with smart cards Nikos MavrogiannopoulosAndreas PashalidisBart Preneel Regular contribution 04 October 2013 Pages: 217 - 228
Active authentication for mobile devices utilising behaviour profiling Fudong LiNathan ClarkePaul Dowland Regular Contribution 11 September 2013 Pages: 229 - 244
Shoulder-surfing-proof graphical password authentication scheme Tzong-Sun WuMing-Lun LeeChao-Yuan Wang Regular Contribution 02 November 2013 Pages: 245 - 254
Risk balance defense approach against intrusions for network server Chengpo MuMeng YuWanyu Zang Regular Contribution 30 October 2013 Pages: 255 - 269
Provably secure E-cash system with practical and efficient complete tracing Bin LianGongliang ChenJianhua Li Regular Contribution 29 April 2014 Pages: 271 - 289
All-or-Nothing Transforms as a countermeasure to differential side-channel analysis Robert P. McEvoyMichael TunstallWilliam P. Marnane Regular contribution 01 October 2013 Pages: 291 - 304