Abstract is missing.
- Modeling and Enhancing Android's Permission SystemElli Fragkaki, Lujo Bauer, Limin Jia, David Swasey. 1-18 [doi]
- Hardening Access Control and Data Protection in GFS-like File SystemsJames Kelley, Roberto Tamassia, Nikos Triandopoulos. 19-36 [doi]
- Attack of the Clones: Detecting Cloned Applications on Android MarketsJonathan Crussell, Clint Gibler, Hao Chen. 37-54 [doi]
- Boosting the Permissiveness of Dynamic Information-Flow Tracking by TestingArnar Birgisson, Daniel Hedin, Andrei Sabelfeld. 55-72 [doi]
- Effective Symbolic Protocol Analysis via Equational Irreducibility ConditionsSerdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse. 73-90 [doi]
- Deciding Epistemic and Strategic Properties of Cryptographic ProtocolsHenning Schnoor. 91-108 [doi]
- Satisfiability and Feasibility in a Relationship-Based Workflow Authorization ModelArif Akram Khan, Philip W. L. Fong. 109-126 [doi]
- Deciding Security for a Fragment of ASLanSebastian Mödersheim. 127-144 [doi]
- A Probabilistic Framework for Localization of Attackers in MANETsMassimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian. 145-162 [doi]
- Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSNRuben Rios, Jorge Cuéllar, Javier Lopez. 163-180 [doi]
- Privacy-Aware Message Exchanges for Geographically Routed Human Movement NetworksAdam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith. 181-198 [doi]
- Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-PartiesItalo Dacosta, Mustaque Ahamad, Patrick Traynor. 199-216 [doi]
- X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-MiddleRalph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle. 217-234 [doi]
- A Practical Man-In-The-Middle Attack on Signal-Based Key Generation ProtocolsSimon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic. 235-252 [doi]
- The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNsAhmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan. 253-270 [doi]
- Security of Patched DNSAmir Herzberg, Haya Shulman. 271-288 [doi]
- Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic ApproachQijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu. 289-306 [doi]
- Exploring Linkability of User ReviewsMishari Al Mishari, Gene Tsudik. 307-324 [doi]
- Formal Analysis of Privacy in an eHealth ProtocolNaipeng Dong, Hugo Jonker, Jun Pang. 325-342 [doi]
- PRIVATUS: Wallet-Friendly Privacy Protection for Smart MetersJinkyu Koo, Xiaojun Lin, Saurabh Bagchi. 343-360 [doi]
- SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location TagsYao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou. 361-378 [doi]
- Secure Proximity Detection for NFC Devices Based on Ambient Sensor DataTzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang. 379-396 [doi]
- Enhancing Location Privacy for Electric Vehicles (at the Right time)Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou. 397-414 [doi]
- Design and Implementation of a Terrorist Fraud Resilient Distance Bounding SystemAanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun. 415-432 [doi]
- Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting SystemYvo Desmedt, Pyrros Chaidos. 433-450 [doi]
- Defining Privacy for Weighted Votes, Single and Multi-voter CoercionJannik Dreier, Pascal Lafourcade, Yassine Lakhnech. 451-468 [doi]
- TorScan: Tracing Long-Lived Connections and Differential Scanning AttacksAlex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann. 469-486 [doi]
- Introducing the gMix Open Source Framework for Mix ImplementationsKarl-Peter Fuchs, Dominik Herrmann, Hannes Federrath. 487-504 [doi]
- Secure and Efficient Outsourcing of Sequence ComparisonsMarina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi. 505-522 [doi]
- Third-Party Private DFA Evaluation on Encrypted Files in the CloudLei Wei 0004, Michael K. Reiter. 523-540 [doi]
- New Algorithms for Secure Outsourcing of Modular ExponentiationsXiaofeng Chen 0001, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou. 541-556 [doi]
- Towards Symbolic Encryption SchemesNaveed Ahmed, Christian Damsgaard Jensen, Erik Zenner. 557-572 [doi]
- Decision Procedures for SimulatabilityCharanjit S. Jutla, Arnab Roy. 573-590 [doi]
- Model-Checking Bisimulation-Based Information Flow Properties for Infinite State SystemsDeepak D'Souza, K. R. Raghavendra. 591-608 [doi]
- Identity-Based Traitor Tracing with Short Private Key and Short CiphertextFuchun Guo, Yi Mu, Willy Susilo. 609-626 [doi]
- Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-ResilienceDavid Galindo, Javier Herranz, Jorge L. Villar. 627-642 [doi]
- Unique Group SignaturesMatthew K. Franklin, Haibin Zhang. 643-660 [doi]
- Relations among Notions of Privacy for RFID Authentication ProtocolsDaisuke Moriyama, Shin'ichiro Matsuo, Miyako Ohkubo. 661-678 [doi]
- PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and RevocationKin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui. 679-696 [doi]
- Dismantling iClass and iClass EliteFlavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac. 697-715 [doi]
- Evaluation of Standardized Password-Based Key Derivation against Parallel Processing PlatformsMarkus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalçin, Ralf Zimmermann 0001. 716-733 [doi]
- Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key RevealCas J. F. Cremers, Michele Feltz. 734-751 [doi]
- Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML EncryptionTibor Jager, Sebastian Schinzel, Juraj Somorovsky. 752-769 [doi]
- On the Security of Password Manager Database FormatsPaolo Gasti, Kasper Bonne Rasmussen. 770-787 [doi]
- Scalable Telemetry Classification for Automated Malware DetectionJack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu, Anil Thomas, Marius Gheorghescu. 788-805 [doi]
- Abstraction-Based Malware Analysis Using Rewriting and Model CheckingPhilippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion. 806-823 [doi]
- Detecting Phishing Emails the Natural Language WayRakesh Verma, Narasimha Shashidhar, Nabil Hossain. 824-841 [doi]
- JVM-Portable Sandboxing of Java's Native LibrariesMengtao Sun, Gang Tan. 842-858 [doi]
- Codejail: Application-Transparent Isolation of Libraries with Tight Program InteractionsYongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang. 859-876 [doi]
- SocialImpact: Systematic Analysis of Underground Social DynamicsZiming Zhao, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi. 877-894 [doi]