All Stories

  1. Improving Fairness and Quality in Master's Thesis Assessment in Norwegian Higher Education
  2. Blockchain-Based Access Control for Electronic Health Records
  3. A decentralized dynamic PKI based on blockchain
  4. A Permissioned Blockchain-based System for Collaborative Drug Discovery
  5. Definitions for Plaintext-Existence Hiding in Cloud Storage
  6. Security Notions for Cloud Storage and Deduplication
  7. Side Channels in Deduplication
  8. Security analysis of the IEEE 802.15.6 standard
  9. Cryptanalysis of a robust key agreement based on public key authentication
  10. On Continuous After-the-Fact Leakage-Resilient Key Exchange
  11. On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard
  12. Cryptanalysis of a new protocol of wide use for email with perfect forward secrecy
  13. Feature-based Type Identification of File Fragments
  14. A secure cryptosystem based on affine transformation
  15. A directly public verifiable signcryption scheme based on elliptic curves
  16. A secure variant of the Hill Cipher
  17. An Elliptic Curve-Based Signcryption Scheme with Forward Secrecy
  18. Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve
  19. SMEmail - A New Protocol for the Secure E-mail in Mobile Environments
  20. LPKI - A lightweight public key Infrastructure for the mobile environments
  21. Solutions to the GSM Security Weaknesses
  22. A new approach to content-based file type detection
  23. SSMS - A secure SMS messaging protocol for the m-payment systems