Abstract is missing.
- MaD2: An Ultra-Performance Stream Cipher for Pervasive Data EncryptionJie Li, Jianliang Zheng. 1-17 [doi]
- Proofs of Retrievability via Fountain CodeSumanta Sarkar, Reihaneh Safavi-Naini. 18-32 [doi]
- MARC: Modified ARC4Jianliang Zheng, Jie Li. 33-44 [doi]
- Detection of HTTP-GET Attack with Clustering and Information Theoretic MeasurementsPawel Chwalinski, Roman Belavkin, Xiaochun Cheng. 45-61 [doi]
- A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment SchemesKhair Eddin Sabri, Ridha Khédri. 62-77 [doi]
- Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong CapacitiesHadi Ahmadi, Reihaneh Safavi-Naini. 78-94 [doi]
- COMPASS: Authenticated Group Key Agreement from SigncryptionNick Mailloux, Ali Miri, Monica Nevins. 95-114 [doi]
- Classifying Online Social Network Users through the Social GraphCristina Pérez-Solà, Jordi Herrera-Joancomartí. 115-131 [doi]
- A Formal Derivation of Composite TrustTim Muller, Patrick Schweitzer. 132-148 [doi]
- IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and UsabilityAhmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel. 149-161 [doi]
- Policy Administration in Tag-Based AuthorizationSandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone. 162-179 [doi]
- Enabling Dynamic Security Policy in the Java Security ManagerFabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens. 180-193 [doi]
- A Novel Obfuscation: Class Hierarchy FlatteningChristophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere. 194-210 [doi]
- RESource: A Framework for Online Matching of Assembly with Open Source CodeAshkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi. 211-226 [doi]
- Touchjacking Attacks on Web in Android, iOS, and Windows PhoneTongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du. 227-243 [doi]
- Short-Term Linkable Group Signatures with Categorized Batch VerificationLukas Malina, Jordi Castellà-Roca, Arnau Vives-Guasch, Jan Hajny. 244-260 [doi]
- GHUMVEE: Efficient, Effective, and Flexible ReplicationStijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere. 261-277 [doi]
- Extracting Attack Scenarios Using Intrusion SemanticsSherif Saad, Issa Traoré. 278-292 [doi]
- On Securely Manipulating XML DataHouari Mahfoud, Abdessamad Imine. 293-307 [doi]
- Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc NetworksIsaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, Issa Traoré. 308-323 [doi]
- QoS Aware Adaptive Security Scheme for Video Streaming in MANETsTahsin Arafat Reza, Michel Barbeau. 324-340 [doi]
- A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADCColin O'Flynn, Zhizhang Chen. 341-356 [doi]
- Towards Modelling Adaptive Attacker's BehaviourLeanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin. 357-364 [doi]
- Scalable Deniable Group Key EstablishmentKashi Neupane, Rainer Steinwandt, Adriana Suárez Corona. 365-373 [doi]
- Information-Theoretic Foundations of Differential PrivacyDarakhshan J. Mir. 374-381 [doi]