4 | -- | 6 | Michael Rabinovich. The Reproducibility versus Debuggability of Research |
8 | -- | 10 | Lieven Desmet, Martin Johns. Real-Time Communications Security on the Web |
11 | -- | 17 | Richard L. Barnes, Martin Thomson. Browser-to-Browser Security Assurances for WebRTC |
18 | -- | 25 | Victoria Beltran, Emmanuel Bertin, Noël Crespi. User Identity for WebRTC Services: A Matter of Trust |
26 | -- | 33 | Li Li 0001, Wu Chou, Zhihong Qiu, Tao Cai. Who Is Calling Which Page on the Web? |
34 | -- | 40 | Luis Lopez Fernandez, Micael Gallego, Boni Garcia, David Fernández-López, Francisco-Javier Lopez. Authentication, Authorization, and Accounting in WebRTC PaaS Infrastructures: The Case of Kurento |
41 | -- | 42 | Tyrone Grandison. Security and Privacy in Web 2.0 [Guest editor's introduction] |
43 | -- | 51 | Lin-Shung Huang, Shrikant Adhikarla, Dan Boneh, Collin Jackson. An Experimental Study of TLS Forward Secrecy Deployments |
52 | -- | 59 | Andrew G. West, Adam J. Aviv. Measuring Privacy Disclosures in URL Query Strings |
60 | -- | 63 | Sean Turner. Transport Layer Security |
64 | -- | 70 | David R. Karger. The Semantic Web and End Users: What's Wrong and How to Fix It |
72 | -- | 76 | Pradeep K. Murukannaiah, Munindar P. Singh. Understanding Location-Based User Experience |
77 | -- | 80 | Soheil Qanbari, Fei Li, Schahram Dustdar. Toward Portable Cloud Manufacturing Services |
81 | -- | 84 | Kieron O'Hara. The Fridge's Brain Sure Ain't the Icebox |
85 | -- | 86 | Charles Petrie. The Failure of HealthCare.gov Exposes Silicon Valley Secrets |
88 | -- | 0 | Vinton G. Cerf. Knocking Down Strawmen |