Abstract is missing.
- A Need-based Assessment for Building a National Cyber Security WorkforceSeymour E. Goodman.
- Advanced Persistent Threats & Social EngineeringEdgar Weippl.
- CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in CloudsNesrine Kaaniche, Maryline Laurent, Mohammed El Barbori. 5-18 [doi]
- Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network IntrusionsPaulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia. 19-30 [doi]
- Certificateless Non-Interactive Key Exchange Protocol without PairingsYun Wei, Fushan Wei, Chuangui Ma. 31-42
- Adaptive Oblivious Transfer with Hidden Access Policy Realizing DisjunctionVandana Guleria, Ratna Dutta. 43-54 [doi]
- A Secure Anonymous Proxy Multi-signature SchemeVishal Saraswat, Rajeev Anand Sahu. 55-66 [doi]
- Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange ProtocolsSaikrishna Badrinarayanan, C. Pandu Rangan. 67-78 [doi]
- Mobile Devices - A Phisher's ParadiseNikos Virvilis, Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis. 79-87 [doi]
- Dynamic Analysis of Usage Control PoliciesYehia Elrakaiby, Jun Pang. 88-100 [doi]
- Formal Analysis of Electronic ExamsJannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan. 101-112 [doi]
- Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized EnvironmentsTsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri. 113-124 [doi]
- FORCE - Fully Off-line secuRe CrEdits for Mobile Micro PaymentsVanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini. 125-136 [doi]
- Privacy Preserving Delegated Word Search in the CloudKaoutar Elkhiyaoui, Melek Önen, Refik Molva. 137-150 [doi]
- Identifying Cryptographic Functionality in Android ApplicationsAlexander Oprisnik, Daniel Hein, Peter Teufl. 151-162 [doi]
- A Formal Model for Forensic Storage Media Preparation ToolsBenjamin Aziz, Philippe Massonet, Christophe Ponsard. 165-170 [doi]
- An Efficient Lightweight Security Algorithm for Random Linear Network CodingHassan Noura, Steven Martin, Khaldoun Al Agha. 171-177 [doi]
- A Steganographic Protocol Based on Linear Error-Block CodesRabiî Dariti, El Mamoun Souidi. 178-183 [doi]
- Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector MachineAdriana-Cristina Enache, Valentin Sgarciu. 184-189 [doi]
- Robust Multispectral Palmprint Identification System by Jointly Using Contourlet Decomposition & Gabor Filter ResponseAbdallah Meraoumia, Salim Chitroub, Ahmed Bouridane. 190-197 [doi]
- Shellcode Detection in IPv6 Networks with HoneydV6Sven Schindler, Oliver Eggert, Bettina Schnor, Thomas Scheffler. 198-205 [doi]
- Signaling Attacks in Mobile TelephonyMihajlo Pavloski, Erol Gelenbe. 206-212 [doi]
- Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash FunctionsSebastian Bittl. 213-220 [doi]
- SMS Spam - A Holistic ViewLamine M. Aouad, Alejandro Mosquera, Slawomir Grzonkowski, Dylan Morss. 221-228 [doi]
- Constructing Empirical Tests of RandomnessMarek Sýs, Petr Svenda, Martin Ukrop, Vashek Matyas. 229-237 [doi]
- Hybrid-Style Personal Key Management in Ubiquitous ComputingByoungcheon Lee. 238-243 [doi]
- Using the Juliet Test Suite to Compare Static Security ScannersAndreas Wagner, Johannes Sametinger. 244-252 [doi]
- Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing MechanismPablo Antón del Pino, Antoine Monsifrot, Charles Salmon-Legagneur, Gwenaël J. Doërr. 253-260 [doi]
- On Privacy Protection in the Internet Surveillance EraDijana Vukovic, Danilo Gligoroski, Zoran Djuric. 261-266 [doi]
- Framework for Securing Data in Cloud Storage ServicesMai Dahshan, Sherif Elkassas. 267-274 [doi]
- Partial Fingerprint Identification Through Correlation-based ApproachOmid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan. 275-284 [doi]
- Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual MachinesHassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle. 285-290 [doi]
- On Reliability of Clock-skew-based Remote Computer IdentificationLibor Polcak, Barbora Franková. 291-298 [doi]
- KDM-CCA Security of the Cramer-Shoup Cryptosystem, RevisitedJinyong Chang, Rui Xue. 299-306 [doi]
- A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval TechniquesJuan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake. 307-314 [doi]
- Modeling Requirements for Security-enhanced Design of Embedded SystemsAlberto Ferrante, Igor Kaitovic, Jelena Milosevic. 315-320 [doi]
- A Novel Pseudo Random Number Generator Based on L'Ecuyer's SchemeFrancesco Buccafurri, Gianluca Lax. 321-328 [doi]
- Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal ApproachNirnay Ghosh, Triparna Mondal, Debangshu Chatterjee, Soumya K. Ghosh. 329-336
- NFC Based Mobile Single Sign-On Solution as a Chrome ExtensionUfuk Celikkan, Can Gelis. 337-343 [doi]
- Secure Virtual Machine Migration (SV2M) in Cloud FederationMuhammad Awais Shibli, Naveed Ahmad, Ayesha Kanwal, Abdul Ghafoor Abbasi. 344-349 [doi]
- Randomized Addition of Sensitive Attributes for l-diversityYuichi Sei, Akihiko Ohsuga. 350-360 [doi]
- Optimizing Elliptic Curve Scalar Multiplication with Near-FactorizationPratik Poddar, Achin Bansal, Bernard Menezes. 361-370 [doi]
- A Hybrid Approach for Content Based Image AuthenticationJinse Shin, Christoph Ruland. 371-378 [doi]
- Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream CiphersFrederik Armknecht, Vasily Mikhalev. 379-386 [doi]
- Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPAShizra Sultan, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Ali Nasir. 387-392 [doi]
- A Cryptographic Study of Tokenization SystemsSandra Diaz-Santiago, Lil María Rodríguez-Henríquez, Debrup Chakraborty. 393-398 [doi]
- Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round SimonNicolas Courtois, Theodosis Mourouzis, Guangyan Song, Pouyan Sepehrdad, Petr Susil. 399-404 [doi]
- Software and Hardware Certification Techniques in a Combined Certification ModelAntonio Muñoz, Antonio Maña. 405-410 [doi]
- Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio SignalAmir I. Sulimov, Alexey D. Smolyakov, Arkadij V. Karpov, Oleg N. Sherstyukov. 411-416 [doi]
- Network-based Intrusion Prevention System Prototype with Multi-Detection - A Position PaperDaniel Kavan, Klára Skodová, Martin Klíma. 417-425 [doi]
- Could Bitcoin Transactions Be 100x Faster?Nicolas T. Courtois, Pinar Emirdag, Daniel A. Nagy. 426-431 [doi]
- Using Bitmaps for Executing Range Queries in Encrypted DatabasesLil María Rodríguez-Henríquez, Debrup Chakraborty. 432-438 [doi]
- Differential Fault Attacks against AES Tampering with the Instruction FlowSilvia Mella, Filippo Melzani, Andrea Visconti. 439-444 [doi]
- Secure Key Distribution based on Meteor Burst CommunicationsAmir Sulimov, Arkadij Karpov. 445-450 [doi]
- COGITO: Code Polymorphism to Secure DevicesDamien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon, Philippe Lalevée. 451-456 [doi]
- Using Abductive and Inductive Inference to Generate Policy ExplanationsFabio Marfia. 457-462 [doi]
- Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public CloudMaherzia Belaazi, Hanen Boussi Rahmouni, Adel Bouhoula. 463-468
- Pseudorandom Number Generators with Balanced Gray CodesJean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi. 469-475
- Keeping an Eye on Your Security Through Assurance IndicatorsMoussa Ouedraogo, Chien-Ting Kuo, Simon Tjoa, David Preston, Eric Dubois 0001, Paulo Simões, Tiago Cruz. 476-483 [doi]
- QR Steganography - A Threat to New Generation Electronic Voting SystemsJordi Cucurull, Sandra Guasch, Alex Escala, Guillermo Navarro-Arribas, Víctor Acín. 484-491 [doi]
- On the Security of Partially Masked Software ImplementationsAlessandro Barenghi, Gerardo Pelosi. 492-499 [doi]
- RBAC with ABS - Implementation Practicalities for RBAC Integrity PoliciesMikko Kiviharju. 500-509 [doi]