A practical privacy-preserving targeted advertising scheme for IPTV users Leyli Javid KhayatiCengiz OrencikBerkant Ustaoglu Regular Contribution 26 July 2015 Pages: 335 - 360
Malware detection using bilayer behavior abstraction and improved one-class support vector machines Qiguang MiaoJiachen LiuJianfeng Song Regular Contribution 09 August 2015 Pages: 361 - 379
Flow-based reputation with uncertainty: evidence-based subjective logic Boris ŠkorićSebastiaan J. A. de HooghNicola Zannone Regular Contribution Open access 20 August 2015 Pages: 381 - 402
On the analysis of time-aware protocols in universal composability framework István Vajda Regular Contribution 23 August 2015 Pages: 403 - 412
A cryptographic study of tokenization systems Sandra Díaz-SantiagoLil María Rodríguez-HenríquezDebrup Chakraborty Regular Contribution 22 January 2016 Pages: 413 - 432
Privacy-preserving authentication framework using bloom filter for secure vehicular communications Avleen MalhiShalini Batra Regular Contribution 07 September 2015 Pages: 433 - 453