Abstract is missing.
- Secure Localization Using Dynamic VerifiersNashad A. Safa, Saikat Sarkar, Reihaneh Safavi-Naini, Majid Ghaderi. 1-20 [doi]
- WiFiHop - Mitigating the Evil Twin Attack through Multi-hop DetectionDiogo Mónica, Carlos Ribeiro. 21-39 [doi]
- Investigation of Signal and Message Manipulations on the Wireless ChannelChristina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun. 40-59 [doi]
- Protecting Private Web Content from Embedded ScriptsYuchen Zhou, David Evans. 60-79 [doi]
- Preventing Web Application Injections with Complementary Character CodingRaymond Mui, Phyllis Frankl. 80-99 [doi]
- Automatic and Precise Client-Side Protection against CSRF AttacksPhilippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens. 100-116 [doi]
- Timing Is Everything: The Importance of History DetectionGunnar Kreitz. 117-132 [doi]
- Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for WeblogsElie Bursztein, Baptiste Gourdin, John C. Mitchell. 133-149 [doi]
- A Systematic Analysis of XSS Sanitization in Web Application FrameworksJoel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Eui Chul Richard Shin, Dawn Song. 150-171 [doi]
- Who Wrote This Code? Identifying the Authors of Program BinariesNathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller. 172-189 [doi]
- Secure and Efficient Protocols for Iris and Fingerprint IdentificationMarina Blanton, Paolo Gasti. 190-209 [doi]
- Linear Obfuscation to Combat Symbolic ExecutionZhi Wang, Jiang Ming, Chunfu Jia, Debin Gao. 210-226 [doi]
- DriverGuard: A Fine-Grained Protection on I/O FlowsYueqiang Cheng, Xuhua Ding, Robert H. Deng. 227-244 [doi]
- Time-Storage Trade-Offs for Cryptographically-Enforced Access ControlJason Crampton. 245-261 [doi]
- Socially Constructed Trust for Distributed AuthorizationSteve Barker, Valerio Genovese. 262-277 [doi]
- Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random OraclesZhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen. 278-297 [doi]
- How to Aggregate the CL Signature SchemeDominique Schröder. 298-314 [doi]
- Key Exchange in IPsec Revisited: Formal Analysis of IKEv1 and IKEv2Cas J. F. Cremers. 315-334 [doi]
- Adapting Helios for Provable Ballot PrivacyDavid Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi. 335-354 [doi]
- Remote Timing Attacks Are Still PracticalBilly Bob Brumley, Nicola Tuveri. 355-371 [doi]
- Multi-run SecurityArnar Birgisson, Andrei Sabelfeld. 372-391 [doi]
- Automated Information Flow Analysis of Virtualized InfrastructuresSören Bleikertz, Thomas Groß, Matthias Schunter, Konrad Eriksson. 392-415 [doi]
- Scalable Analysis of Attack ScenariosMassimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian. 416-433 [doi]
- Usability of Display-Equipped RFID Tags for Security PurposesAlfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun. 434-451 [doi]
- Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login MechanismsAmir Herzberg, Ronen Margulies. 452-471 [doi]
- Towards a Mechanism for Incentivating PrivacyPiero A. Bonatti, Marco Faella, Clemente Galdi, Luigi Sauro. 472-488 [doi]
- Investigating the OpenPGP Web of TrustAlexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle. 489-507 [doi]
- A Practical Complexity-Theoretic Analysis of Mix SystemsDang Vinh Pham, Joss Wright, Dogan Kesdogan. 508-527 [doi]
- A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted CloudsKa Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao. 528-547 [doi]
- Optimizing Mixing in Pervasive Networks: A Graph-Theoretic PerspectiveMurtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux. 548-567 [doi]
- A New RFID Privacy ModelJens Hermans, Andreas Pashalidis, Frederik Vercauteren, Bart Preneel. 568-587 [doi]
- Quantitative Information Flow, with a ViewMichele Boreale, Francesca Pampaloni, Michela Paolini. 588-606 [doi]
- To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome DataXiao-yong Zhou, Bo Peng, Yong Fuga Li, Yangyi Chen, Haixu Tang, Xiaofeng Wang. 607-627 [doi]
- Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query ProcessingNicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu. 628-647 [doi]
- Supporting Concurrency in Private Data OutsourcingSabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati. 648-664 [doi]
- Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection MethodsHannes Federrath, Karl-Peter Fuchs, Dominik Herrmann, Christopher Piosecny. 665-683 [doi]