Link-time smart card code hardening Ronald De KeulenaerJonas MaebeBjorn De Sutter Regular Contribution 27 March 2015 Pages: 111 - 130
Behavior-based approach to detect spam over IP telephony attacks Randa Jabeur Ben ChikhaTarek AbbesAdel Bouhoula Regular Contribution 24 March 2015 Pages: 131 - 143
A uniform approach for access control and business models with explicit rule realization Vahid R. KarimiPaulo S. C. AlencarDonald D. Cowan Regular Contribution 11 February 2015 Pages: 145 - 171
Preventing sensitive relationships disclosure for better social media preservation Elie RaadBechara Al BounaRichard Chbeir Regular Contribution 22 February 2015 Pages: 173 - 194
Resolving privacy-preserving relationships over outsourced encrypted data storages Alberto Huertas CeldránGinés Dólera TormoGregorio Martínez Pérez Regular Contribution 03 April 2015 Pages: 195 - 209
A hybrid approach to vector-based homomorphic tallying remote voting Víctor MateuJosep M. MiretFrancesc Sebé regular contribution 05 March 2015 Pages: 211 - 221
Message from the Guest Editors Guomin YangWilly SusiloYi Mu Editorial 25 January 2016 Pages: 223 - 224