Efficient variant of Rainbow using sparse secret keys
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing
A Model-Driven Approach to Noninterference
Genie in a Model? Why Model Driven Security will not secure your Web Application
Evaluating data utility of privacy-preserving pseudonymized location datasets
Secure and Scalable Multimedia Sharing between Smart Homes