User-mediated authentication protocols and unforgeability in key collision Britta Hale Regular Contribution 19 November 2019 Pages: 609 - 621
After you, please: browser extensions order attacks and countermeasures Pablo Picazo-SanchezJuan TapiadorGerardo Schneider Regular Contribution Open access 21 November 2019 Pages: 623 - 638
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices Yanting ZhangJianwei LiuWeiran Liu Regular Contribution 27 November 2019 Pages: 639 - 656
A context-aware robust intrusion detection system: a reinforcement learning-based approach Kamalakanta SethiE. Sai RupeshY. Venu Madhav regular contribution 03 December 2019 Pages: 657 - 678
Lightweight multi-factor mutual authentication protocol for IoT devices Reem MelkiHassan N. NouraAli Chehab Regular Contribution 13 December 2019 Pages: 679 - 694
A language and a pattern system for temporal property specification: advanced metering infrastructure case study Tina TaviziMehdi Shajari Regular Contribution 09 January 2020 Pages: 695 - 710
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation Lixue SunChunxiang XuKefei Chen Regular contribution 23 January 2020 Pages: 711 - 720