Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret KeyThe use of mobile phones to monitor the status of patients with Parkinson’s diseaseSupporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructureDesign of a quadrocopter with PID-controlled fail-safe algorithmWhy would we get attacked? An analysis of attacker’s aims behind DDoS attacksGuest Editorial: Intelligent Distributed ComputingImage-to-Tree to Select Significant Blocks for Image WatermarkingA Language for the End-user Development of Mobile Context-Aware ApplicationsFine-hearing Google Home: why silence will not protect your privacyOn the Invisibility and Anonymity of Undeniable Signature Schemes