Abstract is missing.
- FP-Block: Usable Web Privacy by Controlling Browser FingerprintingChristof Ferreira Torres, Hugo L. Jonker, Sjouke Mauw. 3-19 [doi]
- Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent InjectionsWenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang, Zhou Li. 20-39 [doi]
- Enabling Privacy-Assured Similarity Retrieval over Millions of Encrypted RecordsXingliang Yuan, Helei Cui, Xinyu Wang, Cong Wang. 40-60 [doi]
- Privacy-Preserving Link Prediction in Decentralized Online Social NetworksYao Zheng, Bing Wang, Wenjing Lou, Yiwei Thomas Hou. 61-80 [doi]
- Privacy-Preserving Observation in Public SpacesFlorian Kerschbaum, Hoon Wei Lim. 81-100 [doi]
- Privacy-Preserving Context-Aware Recommender Systems: Analysis and New SolutionsQiang Tang, Jun Wang. 101-119 [doi]
- Rich Queries on Encrypted Data: Beyond Exact MatchesSky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner. 123-145 [doi]
- Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud DataYanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou. 146-166 [doi]
- Batch Verifiable Computation of Polynomials on Outsourced DataLiang Feng Zhang, Reihaneh Safavi-Naini. 167-185 [doi]
- CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the CloudQian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang. 186-205 [doi]
- Typing and Compositionality for Security Protocols: A Generalization to the Geometric FragmentOmar Almousa, Sebastian Mödersheim, Paolo Modesti, Luca Viganò. 209-229 [doi]
- Checking Trace Equivalence: How to Get Rid of Nonces?Rémy Chrétien, Véronique Cortier, Stéphanie Delaune. 230-251 [doi]
- Attribute Based Broadcast Encryption with Short Ciphertext and Decryption KeyTran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Xiaofeng Chen 0001. 252-269 [doi]
- Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the CloudJianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei. 270-289 [doi]
- DexHunter: Toward Extracting Hidden Code from Packed Android ApplicationsYueqian Zhang, Xiapu Luo, Haoyang Yin. 293-311 [doi]
- Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated SoftwareHong Hu, Zheng-Leong Chua, Zhenkai Liang, Prateek Saxena. 312-331 [doi]
- vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior KnowledgeWei Wang, Jingqiang Lin, Zhan Wang, Ze Wang, Luning Xia. 332-351 [doi]
- Accurate Specification for Robust Detection of Malicious Behavior in Mobile EnvironmentsSufatrio, Tong-Wei Chua, Darell J. J. Tan, Vrizlynn L. L. Thing. 355-375 [doi]
- A Bytecode Interpreter for Secure Program Execution in Untrusted Main MemoryMaximilian Seitzer, Michael Gruhn, Tilo Müller. 376-395 [doi]
- Learning from Others: User Anomaly Detection Using Anomalous Samples from Other UsersYoungja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li. 396-414 [doi]
- Towards Attack-Resistant Peer-Assisted Indoor LocalizationJingyu Hua, Shaoyong Du, Sheng Zhong. 417-437 [doi]
- Leveraging Real-Life Facts to Make Random Passwords More MemorableMahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright, Shannon Scielzo. 438-455 [doi]
- The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online GuessingDing Wang, Ping Wang. 456-477 [doi]
- A Theory of Gray Security PoliciesDonald Ray, Jay Ligatti. 481-499 [doi]
- Factorization of Behavioral IntegrityXimeng Li, Flemming Nielson, Hanne Riis Nielson. 500-519 [doi]
- Checking Interaction-Based Declassification Policies for Android Using Symbolic ExecutionKristopher K. Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, Michael R. Clarkson. 520-538 [doi]
- Enhancing Java Runtime Environment for Smart Cards Against Runtime AttacksRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 541-560 [doi]
- Making Bitcoin Exchanges TransparentChristian Decker, James Guthrie, Jochen Seidel, Roger Wattenhofer. 561-576 [doi]
- Web-to-Application Injection Attacks on Android: Characterization and DetectionBehnaz Hassanshahi, Yaoqi Jia, Roland H. C. Yap, Prateek Saxena, Zhenkai Liang. 577-598 [doi]
- All Your Voices are Belong to Us: Stealing Voices to Fool Humans and MachinesDibya Mukhopadhyay, Maliheh Shirvanian, Nitesh Saxena. 599-621 [doi]
- Balloon: A Forward-Secure Append-Only Persistent Authenticated Data StructureTobias Pulls, Roel Peeters. 622-641 [doi]
- On the Fly Design and Co-simulation of Responses Against Simultaneous AttacksLéa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun, Samuel Dubus. 642-661 [doi]