Abstract is missing.
- Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern ProcessorsAndreas Zankl, Katja Miller, Johann Heyszl, Georg Sigl. 3-19 [doi]
- More Practical and Secure History-Independent Hash TablesMichael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia. 20-38 [doi]
- On Manufacturing Resilient Opaque Constructs Against Static AnalysisBrendan Sheridan, Micah Sherr. 39-58 [doi]
- Robust Password-Protected Secret SharingMichel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval. 61-79 [doi]
- Compiling Low Depth Circuits for Practical Secure ComputationNiklas Büscher, Andreas Holzer, Alina Weber, Stefan Katzenbeisser 0001. 80-98 [doi]
- Secure Computation of MIPS Machine CodeXiao Shaun Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz. 99-117 [doi]
- Insynd: Improved Privacy-Preserving Transparency LoggingRoel Peeters, Tobias Pulls. 121-139 [doi]
- Secure Logging Schemes and Certificate TransparencyBenjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila. 140-158 [doi]
- Banishing Misaligned Incentives for Validating Reports in Bug-Bounty PlatformsAron Laszka, Mingyi Zhao, Jens Grossklags. 161-178 [doi]
- Efficient Numerical Frameworks for Multi-objective Cyber Security PlanningM. H. R. Khouzani, Pasquale Malacaria, Chris Hankin, Andrew Fielder, Fabrizio Smeraldi. 179-197 [doi]
- On Bitcoin Security in the Presence of Broken Cryptographic PrimitivesIlias Giechaskiel, Cas J. F. Cremers, Kasper Bonne Rasmussen. 201-222 [doi]
- DRE-ip: A Verifiable E-Voting Scheme Without Tallying AuthoritiesSiamak F. Shahandashti, Feng Hao. 223-240 [doi]
- When Are Three Voters Enough for Privacy Properties?Myrto Arapinis, Véronique Cortier, Steve Kremer. 241-260 [doi]
- Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without ScriptsWaclaw Banasik, Stefan Dziembowski, Daniel Malinowski. 261-280 [doi]
- LeiA: A Lightweight Authentication Protocol for CANAndreea-Ina Radu, Flavio D. Garcia. 283-300 [doi]
- Privacy, Discovery, and Authentication for the Internet of ThingsDavid J. Wu, Ankur Taly, Asim Shankar, Dan Boneh. 301-319 [doi]
- Secure Code Updates for Mesh Networked Commodity Low-End Embedded DevicesFlorian Kohnhäuser, Stefan Katzenbeisser 0001. 320-338 [doi]
- Authenticated Key Agreement Mediated by a Proxy Re-encryptor for the Internet of ThingsKim Thuat Nguyen, Nouha Oualha, Maryline Laurent. 339-358 [doi]
- Information Control by Policy-Based Relational Weakening TemplatesJoachim Biskup, Marcel Preuß. 361-381 [doi]
- Quantifying Location Privacy Leakage from Transaction PricesArthur Gervais, Hubert Ritzdorf, Mario Lucic, Vincent Lenders, Srdjan Capkun. 382-405 [doi]
- A Formal Treatment of Privacy in Video DataValerie Fetzer, Jörn Müller-Quade, Tobias Nilges. 406-424 [doi]
- On Attacker Models and Profiles for Cyber-Physical SystemsMarco Rocchetto, Nils Ole Tippenhauer. 427-449 [doi]
- Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed IntrudersVivek Nigam, Carolyn L. Talcott, Abraão Aires Urquiza. 450-470 [doi]
- Safeguarding Structural Controllability in Cyber-Physical Control SystemsCristina Alcaraz, Javier Lopez. 471-489 [doi]
- The Beauty or The Beast? Attacking Rate Limits of the Xen HypervisorJohanna Ullrich, Edgar R. Weippl. 493-511 [doi]
- Autocomplete Injection AttackNethanel Gelernter, Amir Herzberg. 512-530 [doi]
- Breaking into the KeyStore: A Practical Forgery Attack Against Android KeyStoreMohamed Sabt, Jacques Traoré. 531-548 [doi]
- Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay EfficientlyJianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong, Jie Chen 0021. 551-569 [doi]
- Server-Aided Revocable Attribute-Based EncryptionHui Cui, Robert H. Deng, Yingjiu Li, Baodong Qin. 570-587 [doi]
- Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access ControlWeiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang. 588-605 [doi]