A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study Khamphao SisaatSurin KittitornkunHiroshi Ishii Regular Contribution 12 July 2016 Pages: 459 - 473
Detecting zero-day attacks using context-aware anomaly detection at the application-layer Patrick DuesselChristian GehlMichael Meier Regular Contribution 20 July 2016 Pages: 475 - 490
Analysis of privacy in mobile telephony systems Myrto ArapinisLoretta Ilaria ManciniMark Dermot Ryan Regular Contribution Open access 05 July 2016 Pages: 491 - 523
Mutual authentications to parties with QR-code applications in mobile systems Cheng-Ta HuangYu-Hong ZhangShiuh-Jeng Wang Regular Contribution 14 September 2016 Pages: 525 - 540
Generic construction of an \(\mathrm {eCK}\)-secure key exchange protocol in the standard model Janaka Alawatugoda Regular Contribution 05 August 2016 Pages: 541 - 557
Certificateless and identity-based authenticated asymmetric group key agreement Lei ZhangQianhong WuWenchang Shi Regular Contribution 29 June 2016 Pages: 559 - 576