Abstract is missing.
- Security Analysis of Niu et al. Authentication and Ownership Management ProtocolMasoumeh Safkhani, Hoda Jannati, Nasour Bagheri. 3-16 [doi]
- PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor NetworksHao Wang, Guangjie Han, Chunsheng Zhu, Sammy Chan. 17-29 [doi]
- A Robust Authentication Protocol with Privacy Protection for Wireless Sensor NetworksXiong Li, Jianwei Niu 0002, Kim-Kwang Raymond Choo. 30-44 [doi]
- Energy Optimization of Unrolled Block Ciphers Using Combinational CheckpointingSiva Nishok Dhanuskodi, Daniel E. Holcomb. 47-61 [doi]
- LDA-Based Clustering as a Side-Channel DistinguisherRauf Mahmudlu, Valentina Banciu, Lejla Batina, Ileana Buhan. 62-75 [doi]
- Efficient Implementation of Ring-LWE Encryption on High-End IoT PlatformZhe Liu 0001, Reza Azarderakhsh, Howon Kim, Hwajeong Seo. 76-90 [doi]
- Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens. 91-104 [doi]
- Enhancing EMV Tokenisation with Dynamic Transaction TokensDanushka Jayasinghe, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes. 107-122 [doi]
- Bias in the Mifare DESFire EV1 TRNGDarren Hurley-Smith, Julio Hernandez-Castro. 123-133 [doi]
- Optimality Results on the Security of Lookup-Based ProtocolsSjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua. 137-150 [doi]
- Towards Quantum Distance Bounding ProtocolsAysajan Abidin, Eduard Marin, Dave Singelée, Bart Preneel. 151-162 [doi]
- Matching in Proximity Authentication and Mobile Payment EcoSystem: What Are We Missing?Yunhui Zhuang, Alvin Chung Man Leung, James Hughes. 163-172 [doi]
- \upmu Proxy: A Hardware Relay for Anonymous and Secure Internet AccessDavid Cox, David Oswald. 175-187 [doi]
- Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing AttacksQiao Hu, Gerhard P. Hancke 0002. 188-203 [doi]