Abstract is missing.
- Fair Anonymous Authentication for Location Based ServicesPanayiotis Kotzanikolaou, Emmanouil Magkos, Nikolaos Petrakos, Christos Douligeris, Vassilios Chrissikopoulos. 1-14 [doi]
- Enhancing Privacy in LTE Paging System Using Physical Layer IdentificationTuan Ta, John S. Baras. 15-28 [doi]
- Post-hoc User Traceability Analysis in Electronic Toll Pricing SystemsXihui Chen, David Fonkwe, Jun Pang. 29-42 [doi]
- An Efficient and Secure Coding-Based Authenticated Encryption SchemeMohammed Meziani, Rachid El Bansarkhani. 43-60 [doi]
- Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of GermanyRonny Merkel, Matthias Pocs, Jana Dittmann, Claus Vielhauer. 61-74 [doi]
- Differential Privacy in Tripartite Interaction: A Case Study with Linguistic Minorities in CanadaArnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan. 75-88 [doi]
- EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set SimilarityCarlo Blundo, Emiliano De Cristofaro, Paolo Gasti. 89-103 [doi]
- SlopPy: Slope One with PrivacySébastien Gambs, Julien Lolive. 104-117 [doi]
- A Semi-lattice Model for Multi-lateral SecurityFlorian Kammüller. 118-132 [doi]
- Prioritized Execution of Privacy PoliciesIlaria Matteucci, Paolo Mori, Marinella Petrocchi. 133-145 [doi]
- What Websites Know About YouElisa Costante, Jerry den Hartog, Milan Petkovic. 146-159 [doi]
- Automating Privacy Enforcement in Cloud PlatformsPeng Yu, Jakub Sendor, Gabriel Serme, Anderson Santana de Oliveira. 160-173 [doi]
- Evaluation of Jif and Joana as Information Flow Analyzers in a Model-Driven ApproachKuzman Katkalov, Peter Fischer, Kurt Stenzel, Nina Moebius, Wolfgang Reif. 174-186 [doi]
- Analyzing HTTP User Agent Anomalies for Malware DetectionNizar Kheir. 187-200 [doi]
- AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database OutsourcingMohammad Ali Hadavi, Ernesto Damiani, Rasool Jalili, Stelvio Cimato, Zeinab Ganjei. 201-216 [doi]
- Configuration Assessment as a ServiceMatteo Maria Casalino, Henrik Plate, Serena Elisa Ponta. 217-226 [doi]
- Automated Smartphone Security ConfigurationWilliam M. Fitzgerald, Ultan Neville, Simon N. Foley. 227-242 [doi]
- On the Detectability of Weak DoS Attacks in Wireless Sensor NetworksDenise Dudek. 243-257 [doi]
- μSec: A Security Protocol for Unicast Communication in Wireless Sensor NetworksAmrita Ghosal, Sur Sanjib, DasBit Sipra. 258-273 [doi]
- Security Monitoring for Content-Centric NetworkingDavid Goergen, Thibault Cholez, Jérôme François, Thomas Engel. 274-286 [doi]
- Towards Session-Aware RBAC Delegation: Function SwitchMeriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Stephane Morucci. 287-302 [doi]
- Policy Chain for Securing Service Oriented ArchitecturesWihem Arsac, Annett Laube, Henrik Plate. 303-317 [doi]
- Towards a Temporal Response TaxonomyWael Kanoun, Layal Samarji, Nora Cuppens-Boulahia, Samuel Dubus, Frédéric Cuppens. 318-331 [doi]