Secure and collusion-resistant data aggregation from convertible tags Iraklis LeontiadisMing Li Regular contribution 29 January 2020 Pages: 1 - 20
Measuring and visualizing cyber threat intelligence quality Daniel SchletteFabian BöhmGünther Pernul Regular Contribution Open access 02 March 2020 Pages: 21 - 38
Do not let Next-Intent Vulnerability be your next nightmare: type system-based approach to detect it in Android apps Mohamed A. El-ZawawyEleonora LosioukMauro Conti Regular contribution 06 March 2020 Pages: 39 - 58
NSDroid: efficient multi-classification of android malware using neighborhood signature in local function call graphs Pengfei LiuWeiping WangChushu Liu regular contribution 12 March 2020 Pages: 59 - 71
Obfuscated integration of software protections Jens Van den BroeckBart CoppensBjorn De Sutter Regular contribution 18 March 2020 Pages: 73 - 101
Cryptanalysis of a non-interactive deniable ring signature scheme Huiwen JiaChunming Tang regular contribution 11 April 2020 Pages: 103 - 112
Risk model development for information security in organization environment based on business perspectives Prajna Deshanta IbnugrahaLukito Edi NugrohoPaulus Insap Santosa regular contribution 19 April 2020 Pages: 113 - 126