Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model Mehrdad AliasgariMarina BlantonFattaneh Bayatbabolghani Regular Contribution 23 September 2016 Pages: 577 - 601
rPIR: ramp secret sharing-based communication-efficient private information retrieval Lichun LiMichael MilitzerAnwitaman Datta Regular Contribution 02 September 2016 Pages: 603 - 625
An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks Alireza EsfahaniGeorgios MantasJosé Carlos Neves Regular Contribution 19 September 2016 Pages: 627 - 639
Development of dynamic protection against timing channels Shahrzad KananizadehKirill Kononenko Regular Contribution 22 December 2016 Pages: 641 - 651
On the efficiency of user identification: a system-based approach Apostolos MalatrasDimitris GeneiatakisIoannis Vakalis Regular Contribution Open access 05 July 2016 Pages: 653 - 671
Periodicity in software vulnerability discovery, patching and exploitation HyunChul JohYashwant K. Malaiya Regular Contribution 19 July 2016 Pages: 673 - 690