Privacy-enhanced architecture for smart metering Félix Gómez MármolChristoph SorgeGregorio Martínez Pérez Regular Contribution 28 November 2012 Pages: 67 - 82
Cryptanalysis of the convex hull click human identification protocol Hassan Jameel AsgharShujun LiHuaxiong Wang Regular Contribution 30 October 2012 Pages: 83 - 96
Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors Mansour AlsalehP. C. van Oorschot Regular Contribution 08 November 2012 Pages: 97 - 110
A framework for establishing trust in Cloud provenance Imad M. Abbadi Regular Contribution 02 November 2012 Pages: 111 - 128
On the measurement of privacy as an attacker’s estimation error David Rebollo-MonederoJavier Parra-ArnauJordi Forné Regular Contribution 11 December 2012 Pages: 129 - 149
On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem Panagiotis RizomiliotisStefanos Gritzalis Regular Contribution 30 December 2012 Pages: 151 - 154