Abstract is missing.
- From Intrusion Detection to Software DesignSandro Etalle. 1-10 [doi]
- Justifying Security Measures - a Position PaperCormac Herley. 11-17 [doi]
- The Once and Future OnionPaul Syverson. 18-28 [doi]
- Tightly Secure Ring-LWE Based Key Encapsulation with Short CiphertextsMartin R. Albrecht, Emmanuela Orsini, Kenneth G. Paterson, Guy Peer, Nigel P. Smart. 29-46 [doi]
- Tree-Based Cryptographic Access ControlJames Alderman, Naomi Farley, Jason Crampton. 47-64 [doi]
- Source Code Authorship Attribution Using Long Short-Term Memory Based NetworksBander Alsulami, Edwin Dauber, Richard E. Harang, Spiros Mancoridis, Rachel Greenstadt. 65-82 [doi]
- Is My Attack Tree Correct?Maxime Audinot, Sophie Pinchinat, Barbara Kordy. 83-102 [doi]
- Server-Aided Secure Computation with Off-line PartiesFoteini Baldimtsi, Dimitrios Papadopoulos, Stavros Papadopoulos, Alessandra Scafuro, Nikos Triandopoulos. 103-123 [doi]
- We Are Family: Relating Information-Flow TrackersMusard Balliu, Daniel Schoepe, Andrei Sabelfeld. 124-145 [doi]
- Labeled Homomorphic Encryption - Scalable and Privacy-Preserving Processing of Outsourced DataManuel Barbosa, Dario Catalano, Dario Fiore. 146-166 [doi]
- MTD CBITS: Moving Target Defense for Cloud-Based IT SystemsAlexandru G. Bardas, Sathya Chandran Sundaramurthy, Xinming Ou, Scott A. DeLoach. 167-186 [doi]
- Modular Verification of Protocol Equivalence in the Presence of RandomnessMatthew S. Bauer, Rohit Chadha, Mahesh Viswanathan 0001. 187-205 [doi]
- Non-interactive Provably Secure Attestations for Arbitrary RSA Prime Generation AlgorithmsFabrice Benhamouda, Houda Ferradi, Rémi Géraud, David Naccache. 206-223 [doi]
- Reusing Nonces in Schnorr Signatures - (and Keeping It Secure...)Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud. 224-241 [doi]
- WebPol: Fine-Grained Information Flow Policies for Web BrowsersAbhishek Bichhawat, Vineet Rajani, Jinank Jain, Deepak Garg 0001, Christian Hammer 0001. 242-259 [doi]
- Verifying Constant-Time Implementations by Abstract InterpretationSandrine Blazy, David Pichardie, Alix Trieu. 260-277 [doi]
- Mirage: Toward a Stealthier and Modular Malware Analysis Sandbox for AndroidLorenzo Bordoni, Mauro Conti, Riccardo Spolaor. 278-296 [doi]
- Zero Round-Trip Time for the Extended Access Control ProtocolJacqueline Brendel, Marc Fischlin. 297-314 [doi]
- Server-Supported RSA Signatures for Mobile DevicesAhto Buldas, Aivo Jürgenson, Aivo Kalu, Mart Oruaas. 315-333 [doi]
- Verifiable Document RedactingHervé Chabanne, Rodolphe Hugel, Julien Keuffer. 334-351 [doi]
- Securing Data Analytics on SGX with RandomizationSwarup Chandra, Vishal Karande, Zhiqiang Lin, Latifur Khan, Murat Kantarcioglu, Bhavani M. Thuraisingham. 352-369 [doi]
- DeltaPhish: Detecting Phishing Webpages in Compromised WebsitesIgino Corona, Battista Biggio, Matteo Contini, Luca Piras, Roberto Corda, Mauro Mereu, Guido Mureddu, Davide Ariu, Fabio Roli. 370-388 [doi]
- Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5Cas Cremers, Martin Dehnel-Wild, Kevin Milner. 389-407 [doi]
- Per-Session Security: Password-Based Cryptography RevisitedGrégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann. 408-426 [doi]
- AVR Processors as a Platform for Language-Based SecurityFlorian Dewald, Heiko Mantel, Alexandra Weber. 427-445 [doi]
- A Better Composition Operator for Quantitative Information Flow AnalysesKai Engelhardt. 446-463 [doi]
- Analyzing the Capabilities of the CAN AttackerSibylle B. Fröschle, Alexander Stühring. 464-482 [doi]