Toward practical encrypted email that supports private, regular-expression searches Lei WeiMichael K. Reiter Regular Contribution Open access 22 November 2014 Pages: 397 - 416
Generic constructions for role-based encryption Lan ZhouVijay VaradharajanMichael Hitchens Regular Contribution 24 October 2014 Pages: 417 - 430
RPCAE: a novel revocable proxy convertible authenticated encryption scheme Han-Yu Lin Regular Contribution 21 November 2014 Pages: 431 - 441
Keyboard acoustic side channel attacks: exploring realistic and security-sensitive scenarios Tzipora HaleviNitesh Saxena Regular Contribution 20 September 2014 Pages: 443 - 456
Trusted mobile model based on DTE technology Tao LiAiqun Hu Regular Contribution 24 October 2014 Pages: 457 - 469
Deployment of a posteriori access control using IHE ATNA Hanieh AzkiaNora Cuppens-BoulahiaSaid Oulmakhzoune Regular Contribution 12 October 2014 Pages: 471 - 483