Portfolio optimization of computer and mobile botnets Qi LiaoZhen Li Regular contribution 18 August 2013 Pages: 1 - 14
A formalization of card-based cryptographic protocols via abstract machine Takaaki MizukiHiroki Shizuya Regular Contribution 22 November 2013 Pages: 15 - 23
Plaintext awareness in identity-based key encapsulation Mark ManulisBertram PoetteringDouglas Stebila Regular Contribution 22 November 2013 Pages: 25 - 49
Group signature implies public-key encryption with non-interactive opening Keita EmuraGoichiro HanaokaJacob C. N. Schuldt Regular Contribution 23 June 2013 Pages: 51 - 62
RORI-based countermeasure selection using the OrBAC formalism Gustavo Gonzalez GranadilloMalek BelhaouaneGrégoire Jacob regular contribution 31 August 2013 Pages: 63 - 79
Perceptual hash function for scalable video Navajit SaikiaPrabin K. Bora Regular Contribution 15 September 2013 Pages: 81 - 93