A method for identifying compromised clients based on DNS traffic analysis Matija StevanovicJens Myrup PedersenStefan Ruehrup Regular Contribution 21 May 2016 Pages: 115 - 132
PiSHi: click the images and I tell if you are a human Maryam MehrnezhadAbbas Ghaemi BafghiEhsan Toreini Regular Contribution Open access 02 February 2016 Pages: 133 - 149
ASICS: authenticated key exchange security incorporating certification systems Colin BoydCas CremersDouglas Stebila Regular Contribution 04 January 2016 Pages: 151 - 171
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake Marco TilocaChristian GehrmannLudwig Seitz Regular Contribution 25 March 2016 Pages: 173 - 193
Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection Ankit SinghHervais C. Simo Fhom Regular Contribution 09 April 2016 Pages: 195 - 211
Two-factor authentication for the Bitcoin protocol Christopher MannDaniel Loebenberger Regular Contribution 05 April 2016 Pages: 213 - 226