Guest Editorial: Advances in Applied Security
Guest Editorial: Addressing Insider Threats and Information Leakage
Guest Editorial: Emerging Security Technologies and Applications
Computation and Transmission Rate Based Algorithm for Reducing the Total Power Consumption
Insiders and Insider Threats An Overview of Definitions and Mitigation Techniques
Efficient and Low-Cost RFID Authentication Schemes
Context-Aware Mobility Management in Heterogeneous Network Environments
Enhancing SVO Logic for Mobile IPv6 Security Protocols
Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity