Abstract is missing.
- Towards Security of Internet Naming InfrastructureHaya Shulman, Michael Waidner. 3-22 [doi]
- Waiting for CSP - Securing Legacy Web Applications with JSAgentsMario Heiderich, Marcus Niemietz, Jörg Schwenk. 23-42 [doi]
- Analyzing the BrowserID SSO System with Primary Identity Providers Using an Expressive Model of the WebDaniel Fett, Ralf Küsters, Guido Schmitz. 43-65 [doi]
- A Practical Approach for Adaptive Data Structure Layout RandomizationPing Chen, Jun Xu, Zhiqiang Lin, Dongyan Xu, Bing Mao, Peng Liu. 69-89 [doi]
- Trustworthy Prevention of Code Injection in Linux on Embedded DevicesHind Chfouka, Hamed Nemati, Roberto Guanciale, Mads Dam, Patrik Ekdahl. 90-107 [doi]
- Practical Memory Deduplication Attacks in Sandboxed JavascriptDaniel Gruss, David Bidner, Stefan Mangard. 108-122 [doi]
- Computational Soundness for Interactive PrimitivesMichael Backes 0001, Esfandiar Mohammadi, Tim Ruffing. 125-145 [doi]
- Verifiably Encrypted Signatures: Security Revisited and a New ConstructionChristian Hanser, Max Rabkin, Dominique Schröder. 146-164 [doi]
- Interleaving Cryptanalytic Time-Memory Trade-Offs on Non-uniform DistributionsGildas Avoine, Xavier Carpent, Cédric Lauradoux. 165-184 [doi]
- Efficient Message Authentication Codes with Combinatorial Group TestingKazuhiko Minematsu. 185-202 [doi]
- Symmetric-Key Based Proofs of Retrievability Supporting Public VerificationChaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu. 203-223 [doi]
- DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key OverheadOscar García Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce. 224-242 [doi]
- Short Accountable Ring Signatures Based on DDHJonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit. 243-265 [doi]
- Updatable Hash Proof System and Its ApplicationsRupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu. 266-285 [doi]
- Server-Aided Revocable Identity-Based EncryptionBaodong Qin, Robert H. Deng, Yingjiu Li, Shengli Liu. 286-304 [doi]
- Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over RingsFabrice Benhamouda, Stephan Krenn, Vadim Lyubashevsky, Krzysztof Pietrzak. 305-325 [doi]
- Making Any Identity-Based Encryption Accountable, EfficientlyAggelos Kiayias, Qiang Tang. 326-346 [doi]
- Practical Threshold Password-Authenticated Secret Sharing ProtocolXun Yi, Feng Hao, Liqun Chen, Joseph K. Liu. 347-365 [doi]
- On Security of Content-Based Video Stream AuthenticationSwee-Won Lo, Zhuo Wei, Robert H. Deng, Xuhua Ding. 366-383 [doi]
- Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint IdentificationMarina Blanton, Siddharth Saraph. 384-406 [doi]
- Practical Invalid Curve Attacks on TLS-ECDHTibor Jager, Jörg Schwenk, Juraj Somorovsky. 407-425 [doi]
- Challenging the Trustworthiness of PGP: Is the Web-of-Trust Tear-Proof?Alessandro Barenghi, Alessandro Di Federico, Gerardo Pelosi, Stefano Sanfilippo. 429-446 [doi]
- Transforming Out Timing Leaks, More or LessHeiko Mantel, Artem Starostin. 447-467 [doi]
- Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM CardsJunrong Liu, Yu Yu, François-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie. 468-480 [doi]
- Should Cyber-Insurance Providers Invest in Software Security?Aron Laszka, Jens Grossklags. 483-502 [doi]
- Lightweight and Flexible Trust Assessment Modules for the Internet of ThingsJan Tobias Mühlberg, Job Noorman, Frank Piessens. 503-520 [doi]
- Confidence Analysis for Nuclear Arms Control: SMT Abstractions of Bayesian Belief NetworksPaul Beaumont, Neil Evans, Michael Huth, Tom Plant. 521-540 [doi]