Abstract is missing.
- An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT SystemsPanagiotis Dedousis, George Stergiopoulos, Dimitris Gritzalis. 1-23 [doi]
- Security and Complexity of a New Variant of the McEliece Cryptosystem Using Non-linear Convolutional CodesMichael Ekonde Sone. 24-50 [doi]
- A Secure Distributed Hash-Based Encryption Mode of Operation Suited for Big Data SystemsOussama Trabelsi, Lilia Sfaxi, Riadh Robbana. 51-78 [doi]
- An Assurance Framework and Process for Hybrid SystemsMarco Anisetti, Claudio Agostino Ardagna, Nicola Bena, Ernesto Damiani. 79-101 [doi]
- PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKEItzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan. 102-128 [doi]
- Practically Efficient Attribute-Based Encryption for Compartmented and Multilevel Access StructuresFerucio Laurentiu Tiplea, Alexandru Ionita, Anca-Maria Nica. 129-150 [doi]
- Analysis of In-Place Randomized Bit-Flipping Decoders for the Design of LDPC and MDPC Code-Based CryptosystemsMarco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini. 151-174 [doi]
- Business Analyst Tasks for Requirement ElicitationMalgorzata Pankowska. 175-193 [doi]
- Chained Transaction Protocol Automated Verification Using Cl-AtSeCatalin V. Bîrjoveanu, Mirela Bîrjoveanu. 194-214 [doi]
- Overall Feasibility of RF Energy Harvesting for IoTFlorian Grante, Ghalid I. Abib, Muriel Muller, Nel Samama. 215-227 [doi]