Understanding trust in privacy-aware video surveillance systems Hatem A. RashwanAgusti SolanasAntoni Martínez-Ballesté Regular Contribution 07 April 2015 Pages: 225 - 234
Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality Tytus KurekMarcin NiemiecArtur Lason Regular Contribution Open access 26 May 2015 Pages: 235 - 250
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation Cengiz OrencikAyse SelcukMurat Kantarcioglu Regular Contribution 23 May 2015 Pages: 251 - 269
Broadcast encryption with dealership Clémentine GrittiWilly SusiloDuncan S. Wong Regular Contribution 07 April 2015 Pages: 271 - 283
Efficient parallelizable hashing using small non-compressing primitives Bart MenninkBart Preneel Regular Contribution 29 April 2015 Pages: 285 - 300
Detection of firewall configuration errors with updatable tree Tarek AbbesAdel BouhoulaMichaël Rusinowitch Regular Contribution 19 May 2015 Pages: 301 - 317
Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems P. SaliniS. Kanmani Regular Contribution 21 November 2015 Pages: 319 - 334