0 | -- | 0 | Andreas Konstantinidis 0002, Georgios Chatzimilioudis, Demetrios Zeinalipour-Yazti. Privacy-Preserving Indoor Localisation and Navigation |
0 | -- | 0 | Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, Felix Hörandner. CREDENTIAL: Secure Cloud Identity Wallet |
0 | -- | 0 | Anze Zitnik, Antonio Álvarez Romero, Stephanie Parker. CyberWISER-Light: Supporting Cyber Risk Assessment with Automated Vulnerability Scanning |
0 | -- | 0 | Paolo Mori, Andrea Saracino, Francesco Di Cerbo. Data Usage Control: Introducing a New Framework for Cloud and Mobile Environments |
0 | -- | 0 | Evangelos Markatos, Egidija Versinskiene, Evaldas Bruze. SENTER: A Network of the European Centres of Excellence in Cyber Crime Research, Training, and Education |
0 | -- | 0 | Thijs Veugen. Client-Server Framework for Securely Outsourcing Computations |
0 | -- | 0 | Nisrine Jafri, Axel Legay, Jean-Louis Lanet. Vulnerability Prediction Against Fault Attacks |
0 | -- | 0 | Ioannis G. Askoxylakis, Nikolaos E. Petroulakis, Vivek Kulkami, Florian Zeiger. VirtuWind - Security in a Virtual and Programmable Industrial Network Prototype Deployed in an Operational Wind Park |
0 | -- | 0 | Christophe Ponsard, Philippe Massonet, Gautier Dallons. Co-engineering Security and Safety Requirements for Cyber-Physical Systems |
0 | -- | 0 | László Havasi, Tamás Szirányi. Multi-View Security and Surveillance at MTA SZTAKI |
0 | -- | 0 | Vicente Matellán, Francisco J. Rodríguez Lera, Jesús Balsa. Cybersecurity in Robotic Systems |
0 | -- | 0 | Marcel Caria. Cyber-Physical Systems: Closing the Gap between Hardware and Software |
0 | -- | 0 | Nicolas Sendrier, Jean-Pierre Tillich. Code-Based Cryptography: New Security Solutions Against a Quantum Adversary |
0 | -- | 0 | Arthur Melissen. Flexible Decentralised Access Control using Invitation-Response Dialogue |
0 | -- | 0 | Marc Stevens. Deprecating an Internet Security Standard with Cryptanalysis |
0 | -- | 0 | Giulia Barbagelata, Marco Attene, Tor Dokken. CAxMan: Design for Additive Manufacturing Made Easy and Cost-effective |
0 | -- | 0 | Fabio Martinelli, Edgar R. Weippl. Cybersecurity - Introduction to the Special Theme |
0 | -- | 0 | Martin Schmiedecker, Sebastian Neuner. On Reducing Bottlenecks in Digital Forensics |
0 | -- | 0 | Dimitris E. Simos. SPLIT: Security Protocol Interaction Testing in Practice |
0 | -- | 0 | Stefano Cresci, Marinella Petrocchi, Maurizio Tesconi, Roberto Di Pietro, Angelo Spognardi. Social Fingerprinting - or the Truth About You |
0 | -- | 0 | Ana Nieto, Rodrigo Roman, Javier Lopez. Digital Witness: Digital Evidence Management Framework for the Internet of Things |
0 | -- | 0 | Benjamin André, Nicolas Anciaux, Philippe Pucheral, Paul Tran-Van. A Root of Trust for the Personal Cloud |
0 | -- | 0 | Marco Tiloca, Christian Gehrmann, Ludwig Seitz. Robust and Scalable DTLS Session Establishment |
0 | -- | 0 | José Bacelar Almeida, Manuel Barbosa, Hugo Pacheco, Vitor Pereira. A Tool-Chain for High-Assurance Cryptographic Software |
0 | -- | 0 | Florian Dold, Christian Grothoff. GNU Taler: Ethical Online Payments for the Internet Age |
0 | -- | 0 | Philippe Antoine, Guillaume Bonfante, Jean-Yves Marion. Gorille: Efficient and Relevant Software Comparisons |
0 | -- | 0 | Joppe W. Bos, Wil Michiels. Security Assessment of Software Security: A Closer Look at White-Box Cryptographic Implementations |
0 | -- | 0 | Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls. A New Architecture for Developing Cryptographic Cloud Services |
0 | -- | 0 | Carmela Gambardella, Ilaria Matteucci, Marinella Petrocchi. Data Sharing Agreements: How to Glue Definition, Analysis and Mapping Together |
0 | -- | 0 | Marco Gramaglia, Marco Fiore. Thwarting Uniqueness in Datasets of Spatiotemporal Trajectories |
0 | -- | 0 | Valérie Viet Triem Tong, Jean-François Lalande, Mourad Leslous. Challenges in Android Malware Analysis |
0 | -- | 0 | Robert N. M. Watson, Simon W. Moore, Peter G. Neumann. CHERI: A Hardware-Software System to Support the Principle of Least Privilege |
0 | -- | 0 | Florian Skopik, Maria Leitner, Timea Pahi. CISA: Establishing National Cyber Situational Awareness to Counter New Threats |
0 | -- | 0 | Fabrizio Biondi, Sébastien Josse, Axel Legay. Bypassing Malware Obfuscation with Dynamic Synthesis |
0 | -- | 0 | Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani. Using Cryptography to Control Your Data at a Distance |
0 | -- | 0 | Erno Rigó, Mihály Héder. A Network of Internet Probes for Fighting Cyber Attacks |
0 | -- | 0 | Nataliia Bielova, Frédéric Besson, Thomas P. Jensen. Using JavaScript Monitoring to Prevent Device Fingerprinting |
0 | -- | 0 | Haralampos Pozidis, Nikolaos Papandreou, Thomas Mittelholzer, Evangelos Eleftheriou. High-Density Data Storage in Phase-Change Memory |