All Stories

  1. Security and privacy of smartphone messaging applications
  2. Security tests for mobile applications — Why using TLS/SSL is not enough
  3. Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations
  4. AES-SEC: Improving Software Obfuscation through Hardware-Assistance
  5. Covert Computation — Hiding code in code through compile-time obfuscation
  6. An algorithm for collusion-resistant anonymization and fingerprinting of sensitive microdata
  7. What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging Applications
  8. QR Code Security: A Survey of Attacks and Challenges for Usable Security
  9. Using Model Driven Security Approaches in Web Application Development
  10. E-voting Authentication with QR-codes
  11. Protecting Anonymity in Data-Driven Biomedical Science
  12. InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs
  13. Data confidentiality using fragmentation in cloud computing
  14. Using the structure of B+‐trees for enhancing logging mechanisms of databases
  15. Quantifying Windows File Slack Size and Stability
  16. Covert computation
  17. InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs
  18. INMOTOS
  19. An Algorithm for k-Anonymity-Based Fingerprinting
  20. Malicious Pixels Using QR Codes as Attack Vector
  21. Digital forensics for enterprise rights management systems
  22. Trees Cannot Lie: Using Data Structures for Forensics Purposes
  23. Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters
  24. Using the structure of B+-trees for enhancing logging mechanisms of databases
  25. QR code security
  26. Anonymity and Pseudonymity in Data-Driven Science