Abstract is missing.
- Secure and Trusted Application Execution on Embedded DevicesKonstantinos Markantonakis, Raja Naeem Akram, Mehari G. Msgna. 3-24 [doi]
- A Number-Theoretic Error-Correcting CodeEric Brier, Jean-Sébastien Coron, Rémi Géraud, Diana Maimut, David Naccache. 25-35 [doi]
- Full Duplex OTP Cryptosystem Based on DNA Key for Text TransmissionsDumitru Balanici, Vlad Tomsa, Monica Borda, Raul Malutan. 39-48 [doi]
- Evaluation of Lightweight Block Ciphers for Embedded SystemsOana Barahtian, Mihai Cuciuc, Lucian Petcana, Catalin Leordeanu, Valentin Cristea. 49-58 [doi]
- CART Versus CHAID Behavioral Biometric Parameter Segmentation AnalysisIonela Roxana Glavan, Daniel Petcu, Emil Simion. 59-68 [doi]
- SCA Resistance Analysis on FPGA Implementations of Sponge Based \mathttMAC-\mathttPHOTONN. Nalla Anandakumar. 69-86 [doi]
- A Novel Fast and Secure Chaos-Based Algorithm for Image EncryptionJean De Dieu Nkapkop, Joseph Yves Effa, Monica Borda, Romulus Terebes. 87-101 [doi]
- A Novel Key Management for Virtually Limitless Key SizeDamir Omerasevic, Narcis Behlilovic, Sasa Mrdovic. 102-118 [doi]
- Efficient Montgomery Multiplication on GPUsNicolae Rosia, Virgil Cervicescu, Mihai Togan. 119-129 [doi]
- Stateful Certificateless Public Key Encryption with Application in Public CloudS. Sree Vivek. 130-149 [doi]
- Applying Cryptographic Acceleration Techniques to Error CorrectionRémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion. 150-168 [doi]
- A Cooperative Black Hole Node Detection and Mitigation Approach for MANETsVimal Kumar 0002, Rakesh Kumar. 171-183 [doi]
- Up-High to Down-Low: Applying Machine Learning to an Exploit DatabaseYisroel Mirsky, Noam Cohen, Asaf Shabtai. 184-200 [doi]
- Detecting Computers in Cyber Space Maliciously Exploited as SSH ProxiesIdan Morad, Asaf Shabtai. 201-211 [doi]
- On a Lightweight Authentication Protocol for RFIDGeorge-Daniel Nastase, Ferucio Laurentiu Tiplea. 212-225 [doi]
- Spam Filtering Using Automated Classifying Services over a Cloud Computing InfrastructureAlecsandru Patrascu, Ion Bica, Victor Valeriu Patriciu. 226-241 [doi]
- Contributions to Steganographic Techniques on Mobile DevicesDominic Bucerzan, Crina Ratiu. 242-252 [doi]
- Secure Implementation of Stream Cipher: TriviumDillibabu Shanmugam, Suganya Annadurai. 253-266 [doi]
- Fast Searching in Image Databases Using Multi-index Robust FingerprintingCezar Plesca, Luciana Morogan, Mihai Togan. 267-279 [doi]