Most recent additions

PDF

Authentication and authorisation in entrusted unions
Ayed F. Dhouha, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petkovic, Dieter Sommer, and John Zic

PDF

The application of an agile approach to it security risk management for SMES
Damien Hutchinson, Chris Armitt, and Dean Edwards-Lear

PDF

An analysis of security issues in building automation systems
Matthew Peacock and Michael N. Johnstone

PDF

Cache-timing attack against aes crypto system - countermeasures review
Yaseen H. Taha, Settana M. Abdulh, Naila A. Sadalla, and Huwaida Elshoush

PDF

Securing identity information with image watermarks
Brian Cusack and Reza Khaleghparas

PDF

Attribute-based encryption with encryption and decryption outsourcing
Muhammad Asim, Milan Petkovic, and Tanya Ignatenko

PDF

Big data in healthcare: What is it used for?
Rebecca Hermon and Patricia A H Williams

*Updated as of 03/27/15.