235 | -- | 236 | Kim-Kwang Raymond Choo, Mehran Mozaffari Kermani, Reza Azarderakhsh, Manimaran Govindarasu. Emerging Embedded and Cyber Physical System Security Challenges and Innovations |
237 | -- | 248 | Zhe Liu 0001, Xinyi Huang, Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, Lu Zhou. On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age |
249 | -- | 264 | Fahimeh Rezaei, Michael Hempel, Hamid Sharif. Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic |
265 | -- | 278 | Ujjwal Guin, Swarup Bhunia, Domenic Forte, Mark Mohammad Tehranipoor. SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware |
279 | -- | 293 | Vittorio P. Illiano, Luis Muñoz-González, Emil C. Lupu. Don't fool Me!: Detection, Characterisation and Diagnosis of Spoofed and Masked Events in Wireless Sensor Networks |
294 | -- | 307 | Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong. A Traceback Attack on Freenet |
308 | -- | 325 | Raphaël Barazzutti, Pascal Felber, Hugues Mercier, Emanuel Onica, Etienne Riviere. Efficient and Confidentiality-Preserving Content-Based Publish/Subscribe with Prefiltering |
326 | -- | 338 | Yogachandran Rahulamathavan, Muttukrishnan Rajarajan. Efficient Privacy-Preserving Facial Expression Classification |
339 | -- | 349 | Ehab S. Elmallah, Mohamed G. Gouda. Hardness of Firewall Analysis |