Issue 4/2014
Content (6 Articles)
Regular Contribution
Efficient verifiably encrypted signatures from lattices
Kee Sung Kim, Ik Rae Jeong
Regular Contribution
Lattice-based certificateless public-key encryption in the standard model
Reza Sepahi, Ron Steinfeld, Josef Pieprzyk
Regular Contribution
Sufficient conditions for sound tree and sequential hashing modes
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche
Regular Contribution
Enhancing security of cookie-based sessions in mobile networks using sparse caching
Amerah Alabrah, Jeffrey Cashion, Mostafa Bassiouni
Regular Contribution
ARITO: Cyber-attack response system using accurate risk impact tolerance
Alireza Shameli-Sendi, Michel Dagenais
Regular Contribution
Randomized gossip algorithms under attack
Mousa Mousazadeh, Behrouz Tork Ladani