+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Volume 6, Issue 3, August 2016 (BibTex)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

An Investigation of Telecom Mobile Data Billing Plans
Yi-Bing Lin, Yun-Wei Lin, Jo-Ching Wu, and Yung-Ching Wang

Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART
Geonbae Na, Jongsu Lim, Kyoungmin Kim, and Jeong Hyun Yi

Implantable Medical Devices; Networking Security Survey
Siamak Aram, Rouzbeh A. Shirvani, Eros G. Pasero, and Mohamd F. Chouikha

Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in 
Adaptive-Predicates Model (Extended Version)
Tapas Pandit, Sumit Kumar Pandey, and Rana Barua
[abstract]  


[Goto Archives]