Abstract is missing.
- Learning More about the Underground Economy: A Case-Study of Keyloggers and DropzonesThorsten Holz, Markus Engelberth, Felix C. Freiling. 1-18 [doi]
- User-Centric Handling of Identity Agent CompromiseDaisuke Mashima, Mustaque Ahamad, Swagath Kannan. 19-36 [doi]
- The Coremelt AttackAhren Studer, Adrian Perrig. 37-52 [doi]
- Type-Based Analysis of PIN Processing APIsMatteo Centenaro, Riccardo Focardi, Flaminia L. Luccio, Graham Steel. 53-68 [doi]
- Declassification with Explicit Reference PointsAlexander Lux, Heiko Mantel. 69-85 [doi]
- Tracking Information Flow in Dynamic Tree StructuresAlejandro Russo, Andrei Sabelfeld, Andrey Chudnov. 86-103 [doi]
- Lightweight Opportunistic Tunneling (LOT)Yossi Gilad, Amir Herzberg. 104-119 [doi]
- Hide and Seek in Time - Robust Covert Timing ChannelsYali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser. 120-135 [doi]
- Authentic Time-Stamps for Archival StorageAlina Oprea, Kevin D. Bowers. 136-151 [doi]
- Towards a Theory of Accountability and AuditRadha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely. 152-167 [doi]
- Reliable Evidence: Auditability by TypingNataliya Guts, Cédric Fournet, Francesco Zappa Nardelli. 168-183 [doi]
- PCAL: Language Support for Proof-Carrying Authorization SystemsAvik Chaudhuri, Deepak Garg. 184-199 [doi]
- ReFormat: Automatic Reverse Engineering of Encrypted MessagesZhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace. 200-215 [doi]
- Protocol Normalization Using Attribute GrammarsDrew Davidson, Randy Smith, Nic Doyle, Somesh Jha. 216-231 [doi]
- Automatically Generating Models for Botnet DetectionPeter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda. 232-249 [doi]
- Dynamic Enforcement of Abstract Separation of Duty ConstraintsDavid A. Basin, Samuel J. Burri, Günter Karjoth. 250-267 [doi]
- Usable Access Control in Collaborative Environments: Authorization Based on People-TaggingQihua Wang, Hongxia Jin, Ninghui Li. 268-284 [doi]
- Requirements and Protocols for Inference-Proof Interactions in Information SystemsJoachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert. 285-302 [doi]
- A Privacy Preservation Model for Facebook-Style Social Network SystemsPhilip W. L. Fong, Mohd M. Anwar, Zhen Zhao. 303-320 [doi]
- New Privacy Results on Synchronized RFID Authentication Protocols against Tag TracingChing Yu Ng, Willy Susilo, Yi Mu, Reihaneh Safavi-Naini. 321-336 [doi]
- Secure Pseudonymous ChannelsSebastian Mödersheim, Luca Viganò. 337-354 [doi]
- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud ComputingQian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou. 355-370 [doi]
- Content Delivery Networks: Protection or Threat?Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovich. 371-389 [doi]
- Model-Checking DoS Amplification for VoIP Session InitiationRavinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer. 390-405 [doi]
- The Wisdom of Crowds: Attacks and Optimal ConstructionsGeorge Danezis, Claudia DÃaz, Emilia Käsper, Carmela Troncoso. 406-423 [doi]
- Secure Evaluation of Private Linear Branching Programs with Medical ApplicationsMauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider. 424-439 [doi]
- Keep a Few: Outsourcing Data While Maintaining ConfidentialityValentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 440-455 [doi]
- Data Structures with Unpredictable TimingDarrell Bethea, Michael K. Reiter. 456-471 [doi]
- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory ComplianceTiancheng Li, Xiaonan Ma, Ninghui Li. 472-488 [doi]
- Corruption-Localizing HashingGiovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini. 489-504 [doi]
- Isolating JavaScript with Filters, Rewriting, and WrappersSergio Maffeis, John C. Mitchell, Ankur Taly. 505-522 [doi]
- An Effective Method for Combating Malicious Scripts ClickbotsYanlin Peng, Linfeng Zhang, J. Morris Chang, Yong Guan. 523-538 [doi]
- Client-Side Detection of XSS Worms by Monitoring Payload PropagationFangqi Sun, Liang Xu, Zhendong Su. 539-554 [doi]
- Formal Indistinguishability Extended to the Random Oracle ModelCristian Ene, Yassine Lakhnech, Van Chan Ngo. 555-570 [doi]
- Computationally Sound Analysis of a Probabilistic Contract Signing ProtocolMihhail Aizatulin, Henning Schnoor, Thomas Wilke. 571-586 [doi]
- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based EncryptionRakeshbabu Bobba, Himanshu Khurana, Manoj Prabhakaran. 587-604 [doi]
- A Generic Security API for Symmetric Key Management on Cryptographic DevicesVéronique Cortier, Graham Steel. 605-620 [doi]
- ID-Based Secure Distance Bounding and LocalizationNils Ole Tippenhauer, Srdjan Capkun. 621-636 [doi]
- Secure Ownership and Ownership Transfer in RFID SystemsTon van Deursen, Sjouke Mauw, Sasa Radomirovic, Pim Vullers. 637-654 [doi]
- Cumulative Attestation Kernels for Embedded SystemsMichael LeMay, Carl A. Gunter. 655-670 [doi]
- Super-Efficient Aggregating History-Independent Persistent Authenticated DictionariesScott A. Crosby, Dan S. Wallach. 671-688 [doi]
- Set Covering Problems in Role-Based Access ControlLiang Chen, Jason Crampton. 689-704 [doi]