Entropy analysis to classify unknown packing algorithms for malware detection Munkhbayar Bat-ErdeneHyundo ParkMahn-Soo Choi Regular Contribution 04 May 2016 Pages: 227 - 248
Making random permutations from physically unclonable constants Riccardo BernardiniRoberto Rinaldo Regular Contribution 17 March 2016 Pages: 249 - 261
A modified exhaustive search on a password system using SHA-1 Minchul KimYounghoon JungJunghwan Song Regular Contribution 20 June 2016 Pages: 263 - 269
A key management scheme evaluation using Markov processes Hani Ragab-HassenEsma Lounes Regular Contribution Open access 04 June 2016 Pages: 271 - 280
Linkable message tagging: solving the key distribution problem of signature schemes Felix GüntherBertram Poettering Regular Contribution 30 March 2016 Pages: 281 - 297
Efficient identity-based online/offline encryption and signcryption with short ciphertext Jianchang LaiYi MuFuchun Guo Regular Contribution 18 February 2016 Pages: 299 - 311
Broadcast anonymous routing (BAR): scalable real-time anonymous communication Panayiotis KotzanikolaouGeorge ChatzisofroniouMike Burmester Regular Contribution 03 February 2016 Pages: 313 - 326
A certificateless approach to onion routing Dario CatalanoDario FioreRosario Gennaro Regular Contribution 17 June 2016 Pages: 327 - 343