Abstract is missing.
- Emerging Security Challenges for Ubiquitous DevicesMiroslaw Kutylowski, Piotr Syga, Moti Yung. 3-18 [doi]
- Catalog and Illustrative Examples of Lightweight Cryptographic PrimitivesAleksandra Mileva, Vesna Dimitrova, Orhun Kara, Miodrag J. Mihaljevic. 21-47 [doi]
- Selected Design and Analysis Techniques for Contemporary Symmetric EncryptionVasily Mikhalev, Miodrag J. Mihaljevic, Orhun Kara, Frederik Armknecht. 49-62 [doi]
- An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher FamiliesTomer Ashur, Atul Luykx. 63-78 [doi]
- ePassport and eID TechnologiesLucjan Hanzlik, Miroslaw Kutylowski. 81-97 [doi]
- Ultra-lightweight AuthenticationXavier Carpent, Paolo D'Arco, Roberto De Prisco. 99-112 [doi]
- From Relay Attacks to Distance-Bounding ProtocolsGildas Avoine, Ioana Boureanu, David Gérault, Gerhard P. Hancke 0002, Pascal Lafourcade 0001, Cristina Onete. 113-130 [doi]
- It Started with Templates: The Future of Profiling in Side-Channel AnalysisLejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek. 133-145 [doi]
- Side Channel Assessment Platforms and Tools for Ubiquitous SystemsApostolos P. Fournaris, Athanassios Moschos, Nicolas Sklavos 0001. 147-163 [doi]
- Challenges in Certifying Small-Scale (IoT) Hardware Random Number GeneratorsDarren Hurley-Smith, Julio Hernandez-Castro. 165-181 [doi]
- Finding Software Bugs in Embedded DevicesAurélien Francillon, Sam L. Thomas, Andrei Costin. 183-197 [doi]
- Privacy-Oriented Analysis of Ubiquitous Computing Systems: A 5-D ApproachAgusti Solanas, Edgar Batista, Fran Casino, Achilleas Papageorgiou, Constantinos Patsakis. 201-213 [doi]
- IoT ForensicsSasa Mrdovic. 215-229 [doi]