Abstract is missing.
- Power efficient and secure full-duplex wireless communication systemsDerrick Wing Kwan Ng, Yan Lindsay Sun, Robert Schober. 1-6 [doi]
- Critical segment based real-time E-signature for securing mobile transactionsYanzhi Ren, Chen Wang, Yingying Chen, Mooi Choo Chuah, Jie Yang 0003. 7-15 [doi]
- Wiretap-channels under constrained active and passive attacksCarsten Rudolf Janda, Moritz Wiese, Janis Nötzel, Holger Boche, Eduard A. Jorswieck. 16-21 [doi]
- Activity tracking: A new attack on location privacyXihui Chen, Andrzej Mizera, Jun Pang. 22-30 [doi]
- Privacy-aware and trustworthy data aggregation in mobile sensingJingyao Fan, Qinghua Li, Guohong Cao. 31-39 [doi]
- A stronger soft-covering lemma and applicationsPaul Cuff. 40-43 [doi]
- A novel and scalable communication-history-based Knapsack authentication framework for IEEE 802.11 networksChangmin Lee, Chen Shen, Gokhan Sahin, KwangHee Choi, Hyeong-Ah Choi. 44-52 [doi]
- An I-MMSE based graphical representation of rate and equivocation for the Gaussian broadcast channelRonit Bustin, Rafael F. Schaefer, H. Vincent Poor, Shlomo Shamai. 53-58 [doi]
- Key agreement over an interference channel with noiseless feedback: Achievable region & distributed allocationSomayeh Salimi, Eduard A. Jorswieck, Mikael Skoglund, Panos Papadimitratos. 59-64 [doi]
- The bright side arguments for the coming smartphones crypto war: The added value of device encryptionDaisuke Moriyama, Moti Yung. 65-73 [doi]
- Boten ELISA: A novel approach for botnet C&C in Online Social NetworksAlberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini. 74-82 [doi]
- Optimal tradeoff of secure PUF-based authenticationKittipong Kittichokechai, Giuseppe Caire. 83-88 [doi]
- Privacy and secrecy with multiple measurements of physical and biometric identifiersOnur Gunlu, Gerhard Kramer, Maciej Skorski. 89-94 [doi]
- Disrupting stealthy botnets through strategic placement of detectorsSridhar Venkatesan, Massimiliano Albanese, Sushil Jajodia. 95-103 [doi]
- Early detection of high entropy trafficHan Zhang, Christos Papadopoulos. 104-112 [doi]
- A novel physical layer authenticated encryption protocol exploiting shared randomnessCornelius Saiki, Arsenia Chorti. 113-118 [doi]
- A Gale-Shapley algorithm for allocation of relayed parallel wiretap coding channelsStefano Tomasin. 119-124 [doi]
- Separation of benign and malicious network events for accurate malware family classificationHesham Mekky, Aziz Mohaisen, Zhi-Li Zhang. 125-133 [doi]
- Unknown malware detection using network traffic classificationDmitri Bekerman, Bracha Shapira, Lior Rokach, Ariel Bar. 134-142 [doi]
- Secrecy games in cognitive radio networks with multiple secondary usersFrederic Gabry, Ragnar Thobaben, Mikael Skoglund. 143-148 [doi]
- SecNFC: Securing inductively-coupled Near Field Communication at physical layerRong Jin, Kai Zeng. 149-157 [doi]
- Reliable and secure communications over Gaussian wiretap channel using HARQ LDPC codes and error contaminationMohamed Haj Taieb, Jean-Yves Chouinard. 158-163 [doi]
- SafePay: Protecting against credit card forgery with existing magnetic card readersYinzhi Cao, Xiang Pan, Yan Chen. 164-172 [doi]
- Security and privacy for body cameras used in law enforcementYufeng Wang, Waqas Latif, Chiu Chiang Tan, Yifan Zhang. 173-181 [doi]
- Circular range search on encrypted spatial dataBoyang Wang, Ming Li, Haitao Wang, Hui Li. 182-190 [doi]
- Secure key agreement using pure biometricsDilara Akdogan, Duygu Karaoglan Altop, Albert Levi. 191-199 [doi]
- Modeling the side-channel attacks in data deduplication with game theoryBing Wang, Wenjing Lou, Y. Thomas Hou. 200-208 [doi]
- Practical covert channels for WiFi systemsJiska Classen, Matthias Schulz, Matthias Hollick. 209-217 [doi]
- Hamming distance as a metric for the detection of CRC-based side-channel communications in 802.11 wireless networksVisal Chea, Miguel Vargas Martin, Ramiro Liscano. 218-226 [doi]
- A novel analytical model and its test bed verification for network covert timing channelsPradhumna Lai Shrestha, Michael Hempel, Fahimeh Rezaei, Hamid Sharif. 227-235 [doi]
- Design and analysis of a model-based Covert Timing Channel for Skype trafficRennie Archibald, Dipak Ghosal. 236-244 [doi]
- PHYVOS: Physical layer voting for secure and fast cooperationBocan Hu, Yan Zhang, Loukas Lazos. 245-253 [doi]
- Physical layer key agreement under signal injection attacksRong Jin, Kai Zeng. 254-262 [doi]
- PHY-layer location privacy-preserving access point selection mechanism in next-generation wireless networksSadegh Farhang, Yezekael Hayel, Quanyan Zhu. 263-271 [doi]
- Securing massive MIMO at the physical layerYuksel Ozan Basciftci, Can Emre Koksal, Alexei Ashikhmin. 272-280 [doi]
- Adversarial wiretap channel with public discussionPengwei Wang, Reihaneh Safavi-Naini. 281-289 [doi]
- Using linkography to understand cyberattacksAndrew Fisher, Carson Kent, David Zage, John Jarocki. 290-298 [doi]
- Multi-objective software assignment for active cyber defenseChu Huang, Sencun Zhu, Quanlong Guan. 299-307 [doi]
- Characterizing phishing threats with Natural Language ProcessingMichael C. Kotson, Alexia Schulz. 308-316 [doi]
- A deception based approach for defeating OS and service fingerprintingMassimiliano Albanese, Ermanno Battista, Sushil Jajodia. 317-325 [doi]
- PLC Guard: A practical defense against attacks on cyber-physical systemsJan-Ole Malchow, Daniel Marzin, Johannes Klick, Robert Kovacs, Volker Roth. 326-334 [doi]
- Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter wavesDaniel Steinmetzer, Joe Chen, Jiska Classen, Edward W. Knightly, Matthias Hollick. 335-343 [doi]
- Emerging attacks on VANET security based on GPS Time SpoofingSebastian Bittl, Arturo A. Gonzalez, Matthias Myrtus, Hanno Beckmann, Stefan Sailer, Bernd Eissfeller. 344-352 [doi]
- Secure partial repair in wireless caching networks with broadcast channelsMajid Gerami, Ming Xiao, Somayeh Salimi, Mikael Skoglund. 353-360 [doi]
- Hammer and anvil: The threat of a cross-layer jamming-aided data control attack in multihop wireless networksLiyang Zhang, Tommaso Melodia. 361-369 [doi]
- Securing wireless medium access control against insider denial-of-service attackersSang-Yoon Chang, Yih-Chun Hu, Zhuotao Liu. 370-378 [doi]
- OnionDNS: A seizure-resistant top-level DomainNolen Scaife, Henry Carter, Patrick Traynor. 379-387 [doi]
- Crowd-based detection of routing anomalies on the internetRahul Hiran, Niklas Carlsson, Nahid Shahmehri. 388-396 [doi]
- Small lies, lots of damage: a partition attack on link-state routing protocolsReuven Cohen, Raziel Hess-Green, Gabi Nakibly. 397-405 [doi]
- Leveraging client-side DNS failure patterns to identify malicious behaviorsPengkui Luo, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Sung-Ju Lee, Antonio Nucci, Marco Mellia. 406-414 [doi]
- Efficient gossip protocols for verifying the consistency of Certificate logsLaurent Chuat, Pawel Szalachowski, Adrian Perrig, Ben Laurie, Eran Messeri. 415-423 [doi]
- Your actions tell where you are: Uncovering Twitter users in a metropolitan areaJinxue Zhang, Jingchao Sun, Rui Zhang 0007, Yanchao Zhang. 424-432 [doi]
- I know what you did on your smartphone: Inferring app usage over encrypted data trafficQinglong Wang, Amir Yahyavi, Bettina Kemme, Wenbo He. 433-441 [doi]
- How voice call technology poses security threats in 4G LTE networksGuan-Hua Tu, Chi-Yu Li, Chunyi Peng, Songwu Lu. 442-450 [doi]
- Group anonymous D2D communication with end-to-end security in LTE-ARuei-Hau Hsu, Jemin Lee. 451-459 [doi]
- Towards a science of anomaly detection system evasionMuhammad Qasim Ali, Ayesha Binte Ashfaq, Ehab Al-Shaer, Qi Duan. 460-468 [doi]
- Inter-flow consistency: A novel SDN update abstraction for supporting inter-flow constraintsWeijie Liu, Rakesh B. Bobba, Sibin Mohan, Roy H. Campbell. 469-478 [doi]
- mTor: A multipath Tor routing beyond bandwidth throttlingLei Yang, FengJun Li. 479-487 [doi]
- Uncovering the mystery of trust in an online social networkGuangchi Liu, Qing Yang, Honggang Wang, Shaoen Wu, Mike P. Wittie. 488-496 [doi]
- Highly scalable verifiable encrypted searchWhitney A. Drazen, Emmanuel Ekwedike, Rosario Gennaro. 497-505 [doi]
- Privacy-preserving distributed statistical computation to a semi-honest multi-cloudAida Calvino, Sara Ricci, Josep Domingo-Ferrer. 506-514 [doi]
- Privacy preserving cloud computing through piecewise approximation of multivariate functionsRiccardo Lazzeretti, Tommaso Pignata. 515-523 [doi]
- Internet-facing PLCs as a network backdoorJohannes Klick, Stephan Lau, Daniel Marzin, Jan-Ole Malchow, Volker Roth. 524-532 [doi]
- A random access procedure based on tunable puzzlesMats Näslund, Elena Dubrova, Göran Selander, Fredrik Lindqvist. 533-540 [doi]
- A firewall algebra for OpenStackSimon N. Foley, Ultan Neville. 541-549 [doi]
- All your cluster-grids are belong to us: Monitoring the (in)security of infrastructure monitoring systemsAndrei Costin. 550-558 [doi]
- Securing the infrastructure and the workloads of linux containersMassimiliano Mattetti, Alexandra Shulman-Peleg, Yair Allouche, Antonio Corradi, Shlomi Dolev, Luca Foschini. 559-567 [doi]
- An integrated method for compliance and risk assessmentSamson Yoseph Esayas, Tobias Mahler, Fredrik Seehusen, Frode Bjornstad, Veda Brubakk. 568-576 [doi]
- Study on impact of adding security in a 6LoWPAN based networkMatthias Carlier, Kris Steenhaut, An Braeken, Ruben Smeets, Nele Mentens, Kris Aerts. 577-584 [doi]
- Some dangers from 2G networks legacy support and a possible mitigationDare Abodunrin, Yoan Miche, Silke Holtmanns. 585-593 [doi]
- Security Enhancements for building saturation-free, low-power NoC-based MPSoCsKyprianos Papadimitriou, Polydoros Petrakis, Miltos D. Grammatikakis, Marcello Coppola. 594-600 [doi]
- CaT: Evaluating cloud-aided TLS for smartphone energy efficiencyKanishka Ariyapala, Mauro Conti, Cristina M. Pinotti. 601-609 [doi]
- Efficient and scalable aggregate signcryption scheme based on multi-trapdoor hash functionsSantosh Chandrasekhar, Mukesh Singhal. 610-618 [doi]
- Publicly verifiable conjunctive keyword search in outsourced databasesMonir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva. 619-627 [doi]
- Integer arithmetic over ciphertext and homomorphic data aggregationYao Chen, Guang Gong. 628-632 [doi]
- Windowing technique for Lazy Sorting of Encrypted dataAyantika Chatterjee, Indranil Sengupta. 633-637 [doi]
- Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environmentQuang Hieu Vu, Maurizio Colombo, Rasool Asal, Ali Sajjad, Fadi Ali El-Moussa, Theo Dimitrakos. 638-642 [doi]
- Self-protecting multi-cloud applicationsAntonio M. Ortiz, Erkuden Rios, Wissam Mallouli, Eider Iturbe, Edgardo Montes de Oca. 643-647 [doi]
- A novel method for securing critical infrastructures by detecting hidden flows of dataFrancesco Benedetto, Gaetano Giunta, Angelo Liguori, Arno Wacker. 648-654 [doi]
- Verifiable and privacy-preserving fine-grained data-collection for smart meteringMoreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran. 655-658 [doi]
- A dynamic algorithm for palmprint recognitionDavid Palma, Pier Luca Montessoro, Giulia Giordano, Franco Blanchini. 659-662 [doi]
- Brain-Computer Interface applications: Security and privacy challengesQianqian Li, Ding Ding, Mauro Conti. 663-666 [doi]
- Analysis and monitoring of hidden TCP traffic based on an open-source covert timing channelAngelo Liguori, Francesco Benedetto, Gaetano Giunta, Nils Kopal, Arno Wacker. 667-674 [doi]
- Identity as a service: A cloud based common capabilityGery Ducatel. 675-679 [doi]
- Identity management in IoT Clouds: A FIWARE case of studyLuciano Barreto, Antonio Celesti, Massimo Villari, Maria Fazio, Antonio Puliafito. 680-684 [doi]
- Traceable hierarchical attribute-based authentication for the cloudHuihui Yang, Vladimir A. Oleshchuk. 685-689 [doi]
- Pulga, a tiny open-source MQTT broker for flexible and secure IoT deploymentsJose Luis Espinosa-Aranda, Noelia Vállez, Carlos Sanchez-Bueno, Daniel Aguado-Araujo, Gloria Bueno, Oscar Déniz. 690-694 [doi]
- A predictive zero-day network defense using long-term port-scan recordingChia-Nan Kao, Yung-Cheng Chang, Nen-Fu Huang, I. Salim S, I-Ju Liao, Rong-Tai Liu, Hsien-Wei Hung. 695-696 [doi]
- URFDS: Systematic discovery of Unvalidated Redirects and Forwards in web applicationsJing Wang, Hongjun Wu. 697-698 [doi]
- Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasuresEmmanouil Vasilomanolakis, Michael Stahn, Carlos Garcia Cordero, Max Mühlhäuser. 699-700 [doi]
- Android malware detection from Google Play meta-data: Selection of important featuresAlfonso Muñoz, Ignacio Martin, Antonio Guzman, José Alberto Hernández. 701-702 [doi]
- Licensed processing of encrypted informationStefan Rass, Peter Schartner. 703-704 [doi]
- End-2-End privacy architecture for IoTSebastian Funke, Jörg Daubert, Alexander Wiesmaier, Panayotis Kikiras, Max Muehlhaeuser. 705-706 [doi]
- Generation and assessment of correlation rules to detect complex attack scenariosErwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk. 707-708 [doi]
- A fuzzing test for dynamic vulnerability detection on Android Binder mechanismKai Wang, Yuqing Zhang, Qixu Liu, Dan Fan. 709-710 [doi]
- New direction for open NFC trusted mobile applications: The MOBISIM projectPascal Urien. 711-712 [doi]
- Space-time tradeoff in the Aho-Corasick string matching algorithmYisi Xu, Derek Pao. 713-714 [doi]
- Improved SDN responsiveness to UDP flood attacksLaura Mutu, Rania Saleh, Ashraf Matrawy. 715-716 [doi]
- Security-enhanced network coding through public-key cryptographyVahid Forutan, Robert F. H. Fischer. 717-718 [doi]
- Secret-key agreement over spatially correlated multiple-antenna channels in the low-SNR regimeMarwen Zorgui, Zouheir Rezki, Basel Alomair, Eduard A. Jorswieck, Mohamed-Slim Alouini. 719-720 [doi]
- CryptoCloak protocol and the prototype applicationDijana Vukovic, Danilo Gligoroski, Zoran Djuric. 721-722 [doi]
- On the effects of large-scale DNS PoisoningAntonio Barili, Dario Lanterna. 723-724 [doi]
- A privacy-preserving recommender system for mobile commerceFélix J. García Clemente. 725-726 [doi]
- DroidChain: A novel malware detection method for Android based on behavior chainZhaoguo Wang, Chenglong Li, Yi Guan, Yibo Xue. 727-728 [doi]
- Did you really hack a nuclear power plant? An industrial control mobile honeypotEmmanouil Vasilomanolakis, Shreyas Srinivasa, Max Mühlhäuser. 729-730 [doi]
- Hide and seek: Detecting sensors in P2P botnetsLeon Bock, Shankar Karuppayah, Tim Grube, Max Mühlhäuser, Mathias Fischer. 731-732 [doi]
- Filtering IP source spoofing using feasible path reverse path forwarding with SDNKevin Benton, L. Jean Camp, Timothy Kelley, Martin Swany. 733-734 [doi]
- CryptID - distributed identity management infrastructureJan-Ole Malchow, Volker Roth. 735-736 [doi]
- A novel Covert Timing Channel detection approach for online network trafficFahimeh Rezaei, Michael Hempel, Pradhumna Lal Shrestha, Sushanta Mohan Rakshit, Hamid Sharif. 737-738 [doi]
- ID2T: A DIY dataset creation toolkit for Intrusion Detection SystemsCarlos Garcia Cordero, Emmanouil Vasilomanolakis, Nikolay Milanov, Christian Koch, David Hausheer, Max Mühlhäuser. 739-740 [doi]
- Compiling NATO authorization policies for enforcement in the cloud and SDNsAlessandro Armando, Silvio Ranise, Riccardo Traverso, Konrad Wrona. 741-742 [doi]
- Timely login status control using mobile appSeokhwan Choi, Da-Hyeon Kim, Yoon Ho Choi. 743-744 [doi]
- Enhancing traffic analysis resistance for Tor hidden services with multipath routingLei Yang, FengJun Li. 745-746 [doi]
- An SELinux-based intent manager for AndroidSimone Mutti, Enrico Bacis, Stefano Paraboschi. 747-748 [doi]
- DockerPolicyModules: Mandatory Access Control for Docker containersEnrico Bacis, Simone Mutti, Steven Capelli, Stefano Paraboschi. 749-750 [doi]
- Towards an SDN-enabled IDS environmentSebastian Seeber, Lars Stiemert, Gabi Dreo Rodosek. 751-752 [doi]
- Energy efficiency performance of cooperative schemes in cognitive radio networks with secrecyFrederic Gabry, Pin-Hsun Lin, Eduard A. Jorswieck. 753-754 [doi]
- GFlux: A google-based system for Fast Flux detectionBasheer Al-Duwairi, Ahmad Al-Hammouri, Monther Aldwairi, Vern Paxson. 755-756 [doi]
- Web bots that mimic human browsing behavior on previously unvisited web-sites: Feasibility study and security implicationsY. Yang, N. Vlajic, U. T. Nguyen. 757-758 [doi]
- Option pricing in a privacy-aware marketMaurizio Naldi, Giuseppe D'Acquisto. 759-760 [doi]
- An Industrial Control Systems incident response decision frameworkYing He, Leandros A. Maglaras, Helge Janicke, Kevin Jones. 761-762 [doi]
- SmartArgos: Improving mobile surveillance systems with software defined networksWaqas A. Latif, Chiu C. Tan. 763-764 [doi]
- Lightweight context-aware security system for wireless Internet accessGokcan Cantali, Orhan Ermis, Gürkan Gür, Fatih Alagöz, M. Ufuk Çaglayan. 765-766 [doi]
- On the use of fuzzy logic in dependable cloud managementSara Foresti, Vincenzo Piuri, Gerson A. Soares. 767-768 [doi]
- Feature extraction and classification phishing websites based on URLMustafa Aydin, Nazife Baykal. 769-770 [doi]
- curlX: A middleware to enforce access control policies within a cloud environmentMeryeme Ayache, Mohammed Erradi, Bernd Freisleben. 771-772 [doi]
- Towards a scalable, private, and searchable key-value storeXingliang Yuan, Xinyu Wang, Yilei Chu, Cong Wang, Chen Qian. 773-774 [doi]