Abstract is missing.
- Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ LimitsIvan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart. 1-18 [doi]
- Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤnJan Camenisch, Robert R. Enderlein, Victor Shoup. 19-37 [doi]
- Privacy-Preserving Accountable ComputationMichael Backes, Dario Fiore, Esfandiar Mohammadi. 38-56 [doi]
- Verifying Web Browser Extensions' Compliance with Private-Browsing ModeBenjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi. 57-74 [doi]
- A Quantitative Evaluation of Privilege Separation in Web Browser DesignsXinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang. 75-93 [doi]
- Estimating Asset Sensitivity by Profiling UsersYoungja Park, Christopher S. Gates, Stephen C. Gates. 94-110 [doi]
- Practical Secure Logging: Seekable Sequential Key GeneratorsGiorgia Azzurra Marson, Bertram Poettering. 111-128 [doi]
- Request-Based Comparable EncryptionJun Furukawa. 129-146 [doi]
- Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the CloudLei Wei 0004, Michael K. Reiter. 147-163 [doi]
- HI-CFG: Construction by Binary Analysis and Application to Attack PolymorphismDan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song. 164-181 [doi]
- AnDarwin: Scalable Detection of Semantically Similar Android ApplicationsJonathan Crussell, Clint Gibler, Hao Chen. 182-199 [doi]
- BISTRO: Binary Component Extraction and Embedding for Software Security ApplicationsZhui Deng, Xiangyu Zhang, Dongyan Xu. 200-218 [doi]
- Vulnerable Delegation of DNS ResolutionAmir Herzberg, Haya Shulman. 219-236 [doi]
- Formal Approach for Route Agility against Persistent AttackersJafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan. 237-254 [doi]
- Plug-and-Play IP Security - Anonymity Infrastructure instead of PKIYossi Gilad, Amir Herzberg. 255-272 [doi]
- Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider ThreatsAron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme. 273-290 [doi]
- Automated Security Proofs for Almost-Universal Hash for MAC VerificationMartin Gagné, Pascal Lafourcade, Yassine Lakhnech. 291-308 [doi]
- Bounded Memory Protocols and Progressing Collaborative SystemsMax I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov. 309-326 [doi]
- Universally Composable Key-ManagementSteve Kremer, Robert Künnemann, Graham Steel. 327-344 [doi]
- A Cryptographic Analysis of OPACITY - (Extended Abstract)Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete. 345-362 [doi]
- Symbolic Probabilistic Analysis of Off-Line GuessingBruno Conchinha, David A. Basin, Carlos Caleiro. 363-380 [doi]
- ASICS: Authenticated Key Exchange Security Incorporating Certification SystemsColin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila. 381-399 [doi]
- Efficient Privacy-Enhanced Familiarity-Based Recommender SystemArjan Jeckmans, Andreas Peter, Pieter H. Hartel. 400-417 [doi]
- Privacy-Preserving User Data Oriented Services for Groups with Dynamic ParticipationDmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe, Reginald L. Lagendijk. 418-442 [doi]
- Privacy-Preserving Matching of Community-Contributed ContentMishari Al Mishari, Paolo Gasti, Gene Tsudik, Ekin Oguz. 443-462 [doi]
- Ballot Secrecy and Ballot Independence CoincideBen Smyth, David Bernhard. 463-480 [doi]
- Election Verifiability or Ballot Privacy: Do We Need to Choose?Edouard Cuvelier, Olivier Pereira, Thomas Peters. 481-498 [doi]
- Enforcing Privacy in the Presence of Others: Notions, Formalisations and RelationsNaipeng Dong, Hugo Jonker, Jun Pang. 499-516 [doi]
- Mining Malware Specifications through Static Reachability AnalysisHugo Daniel Macedo, Tayssir Touili. 517-535 [doi]
- Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object DependenciesJun Dai, Xiaoyan Sun, Peng Liu. 536-555 [doi]
- Measuring and Detecting Malware Downloads in Live Network TrafficPhani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, Manos Antonakakis. 556-573 [doi]
- Automated Certification of Authorisation Policy ResistanceAndreas Griesmayer, Charles Morisset. 574-591 [doi]
- Fine-Grained Access Control System Based on Outsourced Attribute-Based EncryptionJin Li, Xiaofeng Chen 0001, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou. 592-609 [doi]
- Purpose Restrictions on Information UseMichael Carl Tschantz, Anupam Datta, Jeannette M. Wing. 610-627 [doi]
- Distributed Shuffling for Preserving Access ConfidentialitySabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati. 628-645 [doi]
- Range Extension Attacks on Contactless Smart CardsYossef Oren, Dvir Schirman, Avishai Wool. 646-663 [doi]
- CellFlood: Attacking Tor Onion Routers on the CheapMarco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis. 664-681 [doi]
- Nowhere to Hide: Navigating around Privacy in Online Social NetworksMathias Humbert, Théophile Studer, Matthias Grossglauser, Jean-Pierre Hubaux. 682-699 [doi]
- Current Events: Identifying Webpages by Tapping the Electrical OutletShane S. Clark, Hossen A. Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu. 700-717 [doi]
- Eliminating Cache-Based Timing Attacks with Instruction-Based SchedulingDeian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy, David Terei, Alejandro Russo, David Mazières. 718-735 [doi]
- Data-Confined HTML5 ApplicationsDevdatta Akhawe, Frank Li, Warren He, Prateek Saxena, Dawn Song. 736-754 [doi]
- KQguard: Binary-Centric Defense against Kernel Queue Injection AttacksJinpeng Wei, Feng Zhu, Calton Pu. 755-774 [doi]
- Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract)Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake. 775-792 [doi]