Abstract is missing.
- Social Authentication: Harder Than It LooksHyoungshick Kim, John Tang, Ross Anderson. 1-15 [doi]
- The MVP Web-Based Authentication Framework - (Short Paper)Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Bruna Freitas Machado, Alain Forget, Nicholas Wright, Gerry Chan, Robert Biddle. 16-24 [doi]
- A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINsJoseph Bonneau, Sören Preibusch, Ross Anderson. 25-40 [doi]
- The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment ProgramsTyler Moore, Jie Han, Richard Clayton. 41-56 [doi]
- Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper)Dan Bogdanov, Riivo Talviste, Jan Willemson. 57-64 [doi]
- Cryptographic Rule-Based Trading - (Short Paper)Christopher Thorpe, Steven R. Willis. 65-72 [doi]
- Efficient Private Proximity Testing with GSM Location SketchesZi Lin, Denis Foo Kune, Nicholas Hopper. 73-88 [doi]
- Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper)Benjamin Johnson, John Chuang, Jens Grossklags, Nicolas Christin. 89-97 [doi]
- Congestion-Aware Path Selection for TorTao Wang, Kevin S. Bauer, Clara Forero, Ian Goldberg. 98-113 [doi]
- Attacking the Washington, D.C. Internet Voting SystemScott Wolchok, Eric Wustrow, Dawn Isabel, J. Alex Halderman. 114-128 [doi]
- Security Audits RevisitedRainer Böhme. 129-147 [doi]
- Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit LoggingAttila Altay Yavuz, Peng Ning, Michael K. Reiter. 148-163 [doi]
- On Secure Two-Party Integer DivisionMorten Dahl, Chao Ning, Tomas Toft. 164-178 [doi]
- A Non-interactive Range Proof with Constant CommunicationRafik Chaabouni, Helger Lipmaa, Bingsheng Zhang. 179-199 [doi]
- Privacy-Preserving Stream Aggregation with Fault ToleranceT.-H. Hubert Chan, Elaine Shi, Dawn Song. 200-214 [doi]
- Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper)Daniel Slamanig. 215-222 [doi]
- Privacy Enhanced Access Control for Outsourced Data SharingMariana Raykova 0001, Hang Zhao, Steven M. Bellovin. 223-238 [doi]
- Designing Privacy-Preserving Smart Meters with Low-Cost MicrocontrollersAndres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin. 239-253 [doi]
- Memory-Efficient Garbled Circuit Generation for Mobile DevicesBenjamin Mood, Lara Letaw, Kevin R. B. Butler. 254-268 [doi]
- Oblivious Decision Programs from Oblivious Transfer: Efficient ReductionsPayman Mohassel, Salman Niksefat. 269-284 [doi]
- UC-Secure Searchable Symmetric EncryptionKaoru Kurosawa, Yasuhiro Ohtaki. 285-298 [doi]
- CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming ParadigmJunaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider 0003. 299-313 [doi]
- A Cache Timing Attack on AES in Virtualization EnvironmentsMichael Weiß, Benedikt Heinz, Frederic Stumpf. 314-328 [doi]
- Softer Smartcards - Usable Cryptographic Tokens with Secure ExecutionFranz Ferdinand Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi, Steffen Schulz. 329-343 [doi]
- The PACE|AA Protocol for Machine Readable Travel Documents, and Its SecurityJens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler. 344-358 [doi]
- Oblivious Printing of Secret Messages in a Multi-party SettingAleksander Essex, Urs Hengartner. 359-373 [doi]
- Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDsAnthony Van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann. 374-389 [doi]
- CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper)Jeremy Clark, Aleksander Essex. 390-398 [doi]
- Bitter to Better - How to Make Bitcoin a Better CurrencySimon Barber, Xavier Boyen, Elaine Shi, Ersin Uzun. 399-414 [doi]