Guest Editorial: Emerging Software Reliability and System Security Technologies
Supporting Common Criteria Security Analysis with Problem Frames
Plausibilistic Entropy and Anonymity
Analysing Android’s Full Disk Encryption Feature
Enforcing Reputation Constraints on Business Process Workflows
A New Certificateless Blind Signature Scheme