Abstract is missing.
- Formal Verification of RGR-SEC, a Secured RGR Routing for UAANETs Using AVISPA, Scyther and TamarinHoussem E. Mohamadi, Nadjia Kara, Mohand Lagha. 3-16 [doi]
- QoS-Based Sequential Detection Algorithm for Jamming Attacks in VANETFatma Salem, Yassin Elhillali, Smaïl Niar. 17-32 [doi]
- Identifying Previously Requested Content by Side-Channel Timing Attack in NDNErtugrul Dogruluk, António Costa, Joaquim Macedo. 33-46 [doi]
- A Framework to Explore Ethical Issues When Using Big Data Analytics on the Future Networked Internet of ThingsJeffrey S. Saltz. 49-60 [doi]
- VSPReP: Verifiable, Secure and Privacy-Preserving Remote Polling with Untrusted Computing DevicesAmna Qureshi, David Megías, Helena Rifà-Pous. 61-79 [doi]
- Secret Key Classification Based on Electromagnetic Analysis and Feature Extraction Using Machine-Learning ApproachNaila Mukhtar, Yinan Kong. 80-92 [doi]
- Authentication Protocols for an Object with Dynamic RFID TagsSelwyn Piramuthu. 93-101 [doi]
- Deconstructing the SME Spectrum from a Knowledge Management Perspective: Proposing an Adapted SECI ModelShohil Kishore, David Sundaram. 105-116 [doi]
- A New Distributed Brute-Force Password Cracking TechniqueEmanuel Tirado, Brendan Turpin, Cody Beltz, Phillip Roshon, Rylin Judge, Kanwal Gagneja. 117-127 [doi]
- Identifying Drawbacks in Malicious PDF DetectorsAhmed Falah, Lei Pan 0002, Mohamed Abdelrazek, Robin Doss. 128-139 [doi]
- Shifting the Burden: An Ineffective 'Quick Fix' to the New Zealand Tire ProblemAldrich Rasco, David Sundaram. 140-146 [doi]
- A New Method for Sharing the Public Keys in Opportunistic NetworksSamaneh Rashidibajgan, Robin Doss. 147-161 [doi]
- Wearable IoT Security and Privacy: A Review from Technology and Policy PerspectiveOnyeka D'Mello, Mathilde Gelin, Fatma Ben Khelil, Rojen Erik Surek, Huihui Chi. 162-177 [doi]
- Thalos: Secure File Storage in Untrusted CloudsLuca Maria Castiglione, Simon Pietro Romano. 178-192 [doi]
- Ubiquitous Individual Information SystemsClaris Yee Seung Chung, Khushbu Tilvawala, Shohil Kishore, Gabrielle Peko, Asfahaan Mirza, David Sundaram. 193-196 [doi]
- Security and Privacy Protection for eHealth DataSharmin Jahan, Mozammel Chowdhury, Rafiqul Islam, Junbin Gao. 197-205 [doi]