Secure and efficient anonymization of distributed confidential databases Javier HerranzJordi Nin Regular Contribution 23 April 2014 Pages: 497 - 512
Anonymity guarantees of the UMTS/LTE authentication and connection protocol Ming-Feng LeeNigel P. SmartGaven J. Watson Regular Contribution 19 March 2014 Pages: 513 - 527
Data minimisation in communication protocols: a formal analysis framework and application to identity management Meilof VeeningenBenne de WegerNicola Zannone Regular Contribution 12 April 2014 Pages: 529 - 569
A conceptual model of security context Vladimir JovanovikjDušan GabrijelčičTomaž Klobučar Regular Contribution 08 March 2014 Pages: 571 - 581
Using instance-weighted naive Bayes for adapting concept drift in masquerade detection Sevil Sen Regular Contribution 16 April 2014 Pages: 583 - 590