Abstract is missing.
- Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet GraphPaulo Salvador. 1-15 [doi]
- Ka-band High Throughput Satellites for 5G Based Applications: The Athena-Fidus Case StudyMichele Luglio, Cesare Roseti, E. Russo, Francesco Zampognaro. 16-37 [doi]
- Approaches to Securing P2PSIP in MANETsAlexandre Cormier, François Gagnon, Babak Esfandiari, Thomas Kunz. 38-62 [doi]
- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and OutcomesMathupayas Thongmak. 63-80 [doi]
- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational RequirementsZaharah Allah Bukhsh, Marten van Sinderen, Klaas Sikkel, Dick A. C. Quartel. 81-103 [doi]
- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical CouplersAndreas Ahrens, André Sandmann, Steffen Lochmann. 104-122 [doi]
- BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256Marek Sýs, Dusan Klinec, Karel Kubícek, Petr Svenda. 123-149 [doi]
- Resistance of the Point Randomisation Countermeasure for Pairings Against Side-Channel AttackDamien Jauvart, Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin. 150-172 [doi]
- On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward SecrecyJosé Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot. 173-198 [doi]
- History-Based Throttling of Distributed Denial-of-Service AttacksNegar Mosharraf, Anura P. Jayasumana, Indrakshi Ray, Bruhadeshwar Bezawada. 199-223 [doi]
- LocalPKI: An Interoperable and IoT Friendly PKIJean-Guillaume Dumas, Pascal Lafourcade 0001, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel. 224-252 [doi]
- No Such Thing as a Small Leak: Leakage-Abuse Attacks Against Symmetric Searchable EncryptionAlexandre Anzala-Yamajako, Olivier Bernard, Matthieu Giraud, Pascal Lafourcade 0001. 253-277 [doi]
- Computer-Based Analysis of Tomatis Listening Test System Audio DataFélix Buendía García, Manuel Agustí-Melchor, Cristina Pérez-Guillot. 278-291 [doi]
- Optimising Link Quality for Throughput Enhancement in Wireless Sensor NetworksEvangelos D. Spyrou. 292-312 [doi]
- BiPS - A Real-Time-Capable Protocol Framework for Wireless Networked Control Systems and Its ApplicationMarkus Engel, Christopher Kramer, Tobias Braun, Dennis Christmann, Reinhard Gotzhein. 313-336 [doi]
- Using Risk Assessments to Assess Insurability in the Context of Cyber InsuranceDavid Nicolas Bartolini, César Benavente-Peces, Andreas Ahrens. 337-345 [doi]
- Reliability, Fault Tolerance and Other Critical Components for Survivability in Information WarfarePeter Stavroulakis, Maryna Kolisnyk, Vyacheslav Kharchenko, Nikolaos Doukas, Oleksandr P. Markovskyi, Nikolaos G. Bardis. 346-370 [doi]