Abstract is missing.
- A Breach into the Authentication with Built-in Camera (ABC) ProtocolCezara Benegui, Radu-Tudor Ionescu. 3-20 [doi]
- A Practical System for Privacy-Preserving Video SurveillanceElmahdi Bentafat, M. Mazhar Rathore, Spiridon Bakiras. 21-39 [doi]
- Biometric-Authenticated Searchable EncryptionDaniel Gardham, Mark Manulis, Constantin Catalin Dragan. 40-61 [doi]
- \(\mathsf {BioLocker}\): A Practical Biometric Authentication Mechanism Based on 3D FingerveinF. Betül Durak, Loïs Huguenin-Dumittan, Serge Vaudenay. 62-80 [doi]
- Accelerating Forward and Backward Private Searchable Encryption Using Trusted ExecutionViet Vo, Shangqi Lai, Xingliang Yuan, Shifeng Sun, Surya Nepal, Joseph K. Liu. 83-103 [doi]
- Cluster-Based Anonymization of Knowledge GraphsAnh-Tu Hoang, Barbara Carminati, Elena Ferrari. 104-123 [doi]
- Same Point Composable and Nonmalleable Obfuscated Point FunctionsPeter Fenteany, Benjamin Fuller 0001. 124-144 [doi]
- A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke SchemesXuan Thanh Do, Duong Hieu Phan, Moti Yung. 145-164 [doi]
- Multi-Device for SignalSébastien Campion, Julien Devigne, Céline Duguey, Pierre-Alain Fouque. 167-187 [doi]
- On the Cryptographic Deniability of the Signal ProtocolNihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk. 188-209 [doi]
- Powerless SecurityStefan Hoffmann 0004, Jens Müller 0007, Jörg Schwenk, Gerd Bumiller. 213-232 [doi]
- Watching the Weak Link into Your Home: An Inspection and Monitoring Toolkit for TR-069Maximilian Hils, Rainer Böhme. 233-253 [doi]
- The Naked Sun: Malicious Cooperation Between Benign-Looking ProcessesFabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini. 254-274 [doi]
- Quality Evaluation of Cyber Threat Intelligence FeedsHarm Griffioen, Tim M. Booij, Christian Doerr. 277-296 [doi]
- Game Theory-Based Approach for Defense Against APTsJuan E. Rubio, Cristina Alcaraz, Javier López 0001. 297-320 [doi]
- MemShield: GPU-Assisted Software Memory EncryptionPierpaolo Santucci, Emiliano Ingrassia, Giulio Picierro, Marco Cesati. 323-343 [doi]
- Super Root: A New Stealthy Rooting Technique on ARM DevicesZhangkai Zhang, Yueqiang Cheng, Zhoujun Li. 344-363 [doi]
- Towards Automated Augmentation and Instrumentation of Legacy Cryptographic ExecutablesKarim Eldefrawy, Michael Locasto, Norrathep Rattanavipanon, Hassen Saïdi. 364-384 [doi]
- When TLS Meets Proxy on MobileJoyanta Debnath, Sze Yiu Chau, Omar Chowdhury. 387-407 [doi]
- Human Factors in Homograph Attack RecognitionTran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Ayumu Kubota, Tran Van Sang, Rie Shigetomi Yamaguchi. 408-435 [doi]
- Publicly Evaluatable Perceptual HashingRosario Gennaro, David Hadaller, Tahereh Jafarikhah, Zhuobang Liu, William E. Skeith III, Anastasiia Timashova. 436-455 [doi]
- TrollThrottle - Raising the Cost of AstroturfingIlkan Esiyok, Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes 0001. 456-476 [doi]