Ausgabe 6/2020
Inhalt (7 Artikel)
Regular Contribution
User-mediated authentication protocols and unforgeability in key collision
Britta Hale
Open Access
Regular Contribution
After you, please: browser extensions order attacks and countermeasures
Pablo Picazo-Sanchez, Juan Tapiador, Gerardo Schneider
Regular Contribution
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices
Yanting Zhang, Jianwei Liu, Zongyang Zhang, Weiran Liu
regular contribution
A context-aware robust intrusion detection system: a reinforcement learning-based approach
Kamalakanta Sethi, E. Sai Rupesh, Rahul Kumar, Padmalochan Bera, Y. Venu Madhav
Regular Contribution
Lightweight multi-factor mutual authentication protocol for IoT devices
Reem Melki, Hassan N. Noura, Ali Chehab
Regular Contribution
A language and a pattern system for temporal property specification: advanced metering infrastructure case study
Tina Tavizi, Mehdi Shajari
Regular contribution
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation
Lixue Sun, Chunxiang Xu, Yuan Zhang, Kefei Chen