Wirelessly lockpicking a smart card reader Flavio D. GarciaGerhard de Koning GansRoel Verdult Regular Contribution 02 April 2014 Pages: 403 - 420
Analysis of a two-factor graphical password scheme Luigi CatuognoClemente Galdi Regular Contribution 12 February 2014 Pages: 421 - 437
A defense framework against malware and vulnerability exploits Meng ZhangAnand RaghunathanNiraj K. Jha Regular Contribution 27 March 2014 Pages: 439 - 452
Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks Rehana YasminEike RitterGuilin Wang Regular Contribution 23 December 2013 Pages: 453 - 465
Tuning a two-round group key agreement Weizheng GaoKashi NeupaneRainer Steinwandt Regular Contribution 17 January 2014 Pages: 467 - 476
AAnA: Anonymous authentication and authorization based on short traceable signatures Sooyeon ShinTaekyoung Kwon Regular Contribution 09 February 2014 Pages: 477 - 495