Hiding information against structural re-identification Gábor György Gulyás Sándor Imre Regular Contribution 13 February 2018 Pages: 125 - 139
Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy Jian-Wu ZhengJing ZhaoXin-Ping Guan Regular Contribution 07 March 2018 Pages: 141 - 162
Cryptanalytic time–memory trade-off for password hashing schemes Donghoon ChangArpan JatiSomitra Kumar Sanadhya Regular Contribution 17 April 2018 Pages: 163 - 180
Multi-device anonymous authentication Kamil KluczniakJianfeng WangMirosław Kutyłowski Regular Contribution Open access 20 April 2018 Pages: 181 - 197
A methodology for ensuring fair allocation of CSOC effort for alert investigation Ankit ShahRajesh GanesanSushil Jajodia Regular Contribution 09 May 2018 Pages: 199 - 218
Scalable non-deterministic clustering-based k-anonymization for rich networks Miguel Ros-MartínJulián SalasJordi Casas-Roma Regular Contribution 21 May 2018 Pages: 219 - 238
Enhanced Tacit Secrets: System-assigned passwords you can’t write down, but don’t need to Zeinab JoudakiJulie ThorpeMiguel Vargas Martin Regular Contribution 26 May 2018 Pages: 239 - 255