Ausgabe 5/2021
Inhalt (7 Artikel)
A context-centered methodology for IoT forensic investigations
Juan Manuel Castelo Gómez, Javier Carrillo Mondéjar, José Roldán Gómez, José Luis Martínez Martínez
Password-authenticated searchable encryption
Liqun Chen, Kaibin Huang, Mark Manulis, Venkkatesh Sekar
Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware
Sabrina Sicari, Alessandra Rizzardi, Gianluca Dini, Pericle Perazzo, Michele La Manna, Alberto Coen-Porisini
An efficient privacy-preserving pay-by-phone system for regulated parking areas
Ricard Borges, Francesc Sebé
Evaluating card-based protocols in terms of execution time
Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
DEALER: decentralized incentives for threat intelligence reporting and exchange
Florian Menges, Benedikt Putz , Günther Pernul
Enhanced models for privacy and utility in continuous-time diffusion networks
Federica Granese, Daniele Gorla, Catuscia Palamidessi