Efficient verifiably encrypted signatures from lattices Kee Sung KimIk Rae Jeong Regular Contribution 11 January 2014 Pages: 305 - 314
Lattice-based certificateless public-key encryption in the standard model Reza SepahiRon SteinfeldJosef Pieprzyk Regular Contribution 10 December 2013 Pages: 315 - 333
Sufficient conditions for sound tree and sequential hashing modes Guido BertoniJoan DaemenGilles Van Assche Regular Contribution 23 November 2013 Pages: 335 - 353
Enhancing security of cookie-based sessions in mobile networks using sparse caching Amerah AlabrahJeffrey CashionMostafa Bassiouni Regular Contribution 19 December 2013 Pages: 355 - 366
ARITO: Cyber-attack response system using accurate risk impact tolerance Alireza Shameli-SendiMichel Dagenais Regular Contribution 10 December 2013 Pages: 367 - 390
Randomized gossip algorithms under attack Mousa MousazadehBehrouz Tork Ladani Regular Contribution 11 December 2013 Pages: 391 - 402