Ausgabe 5/2017
Inhalt (6 Artikel)
A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study
Khamphao Sisaat, Surin Kittitornkun, Hiroaki Kikuchi, Chaxiong Yukonhiatou, Masato Terada, Hiroshi Ishii
Detecting zero-day attacks using context-aware anomaly detection at the application-layer
Patrick Duessel, Christian Gehl, Ulrich Flegel, Sven Dietrich, Michael Meier
Analysis of privacy in mobile telephony systems
Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Dermot Ryan
Mutual authentications to parties with QR-code applications in mobile systems
Cheng-Ta Huang, Yu-Hong Zhang, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang
Generic construction of an -secure key exchange protocol in the standard model
Janaka Alawatugoda
Certificateless and identity-based authenticated asymmetric group key agreement
Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jiangtao Li, Jianwei Liu, Wenchang Shi