Abstract is missing.
- Malicious MPLS Policy Engine ReconnaissanceAbdulrahman Al-Mutairi, Stephen D. Wolthusen. 3-18 [doi]
- USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' CustomizationsAndré Pereira, Manuel Eduardo Correia, Pedro Brandão. 19-32 [doi]
- Free Typed Text Using Keystroke Dynamics for Continuous AuthenticationPaulo Pinto, Bernardo Patrão, Henrique Santos. 33-45 [doi]
- Secure Storage on Android with Context-Aware Access ControlFaysal Boukayoua, Jorn Lapon, Bart De Decker, Vincent Naessens. 46-59 [doi]
- A Study on Advanced Persistent ThreatsPing Chen, Lieven Desmet, Christophe Huygens. 63-72 [doi]
- Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud SystemsSuaad S. Alarifi, Stephen D. Wolthusen. 73-85 [doi]
- Touchpad Input for Continuous Biometric AuthenticationAlexander Chan, Tzipora Halevi, Nasir Memon. 86-91 [doi]
- A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-EncryptionBernd Zwattendorfer, Daniel Slamanig, Klaus Stranacher, Felix Hörandner. 92-103 [doi]
- D-Shuffle for Prêt à VoterDalia Khader. 104-117 [doi]
- An Approach to Information Security Policy Modeling for Enterprise NetworksDmitry Chernyavskiy, Natalia G. Miloslavskaya. 118-127 [doi]
- Introduction to Attribute Based Searchable EncryptionDalia Khader. 131-135 [doi]
- Risk Analysis of Physically Unclonable FunctionsAndrea Kolberger, Ingrid Schaumüller-Bichl, Martin Deutschmann. 136-139 [doi]
- Decentralized Bootstrap for Social Overlay NetworksRodolphe Marques, André Zúquete. 140-143 [doi]
- Enhancing Privacy with Quantum NetworksPaulo Mateus, Nikola Paunkovic, João Rodrigues, André Souto. 147-153 [doi]
- The Fundamental Principle of Breach PreventionRui Melo Biscaia. 154-156 [doi]