Abstract is missing.
- One-pass authenticated key establishment protocol on bilinear pairings for Wireless Sensor NetworksManoj Ranjan Mishra, Jayaprakash Kar, Banshidhar Majhi. 1-7 [doi]
- Security pairings using physical layer properties of wireless communicationsJani Suomalainen, Antti Evesti, Adrian Kotelba. 1-8 [doi]
- Joint operation of routing control and group key management for 5G ad hoc D2D networksYounchan Jung, Enrique Festijo, Marnel Peradilla. 1-8 [doi]
- Security and privacy in the Internet of Things: Current status and open issuesMohamed Abomhara, Geir M. Køien. 1-8 [doi]
- A keyboard that manages your passwords in AndroidFaysal Boukayoua, Bart De Decker, Vincent Naessens. 1-4 [doi]
- Distributed privacy-preserving mean estimationMirco Schönfeld, Martin Werner 0001. 1-8 [doi]
- An improvement of the batch-authentication and key agreement framework for P2P-based online social networksHuihui Yang, Vladimir A. Oleshchuk. 1-4 [doi]
- Android encryption systemsPeter Teufl, Andreas Fitzek, Daniel Hein, Alexander Marsalek, Alexander Oprisnik, Thomas Zefferer. 1-8 [doi]
- Adaptive online/offline RFID scheme for supply chain management systemsZeeshan Bilal, Keith Martin. 1-9 [doi]
- Do you think your passwords are secure?Dominik Ziegler, Mattias Rauter, Christof Stromberger, Peter Teufl, Daniel Hein. 1-8 [doi]
- Android - On-device detection of SMS catchers and sniffersPeter Teufl, Thomas Zefferer, Christoph Wörgötter, Alexander Oprisnik, Daniel Hein. 1-8 [doi]