New facets of mobile botnet: architecture and evaluation Marios AnagnostopoulosGeorgios KambourakisStefanos Gritzalis Regular Contribution 31 December 2015 Pages: 455 - 473
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts Abdullah AlmaatouqErez ShmueliAlex ‘Sandy’ Pentland Regular Contribution 20 February 2016 Pages: 475 - 491
Private and oblivious set and multiset operations Marina BlantonEveraldo Aguiar Regular Contribution 03 October 2015 Pages: 493 - 518
Efficient and verifiable algorithms for secure outsourcing of cryptographic computations Mehmet Sabır KirazOsmanbey Uzunkol Regular Contribution 30 November 2015 Pages: 519 - 537
Efficient wildcard search over encrypted data Changhui HuLidong Han Regular Contribution 04 September 2015 Pages: 539 - 547
Time-specific encryption from forward-secure encryption: generic and direct constructions Kohei KasamatsuTakahiro MatsudaHideki Imai Regular Contribution 21 November 2015 Pages: 549 - 571