A context-centered methodology for IoT forensic investigations Juan Manuel Castelo GómezJavier Carrillo MondéjarJosé Luis Martínez Martínez regular contribution 10 November 2020 Pages: 647 - 673
Password-authenticated searchable encryption Liqun ChenKaibin HuangVenkkatesh Sekar Regular Contribution Open access 22 November 2020 Pages: 675 - 693
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware Sabrina SicariAlessandra RizzardiAlberto Coen-Porisini regular contribution Open access 23 November 2020 Pages: 695 - 713
An efficient privacy-preserving pay-by-phone system for regulated parking areas Ricard BorgesFrancesc Sebé Regular Contribution 24 November 2020 Pages: 715 - 727
Evaluating card-based protocols in terms of execution time Daiki MiyaharaItaru UedaHideaki Sone regular contribution Open access 27 November 2020 Pages: 729 - 740
DEALER: decentralized incentives for threat intelligence reporting and exchange Florian MengesBenedikt Putz Günther Pernul Regular Contribution Open access 09 December 2020 Pages: 741 - 761
Enhanced models for privacy and utility in continuous-time diffusion networks Federica GraneseDaniele GorlaCatuscia Palamidessi regular contribution 02 January 2021 Pages: 763 - 782