Abstract is missing.
- On the Efficiency of Mathematics in Intrusion Detection: The NetEntropy CaseJean Goubault-Larrecq, Julien Olivain. 3-16 [doi]
- On the Feasibility of a Censorship Resistant Decentralized Name SystemMatthias Wachs, Martin Schanzenbach, Christian Grothoff. 19-30 [doi]
- A General Framework for Group Authentication and Key Exchange ProtocolsHuihui Yang, Lei Jiao, Vladimir A. Oleshchuk. 31-45 [doi]
- Modelling Simultaneous Mutual Authentication for Authenticated Key ExchangeZheng Yang. 46-62 [doi]
- Model-Based Specification and Validation of Security and Dependability PatternsBrahim Hamid, Christian Percebois. 65-82 [doi]
- Enforcing Information Flow by Combining Static and Dynamic AnalysisAndrew Bedford, Josée Desharnais, Théophane G. Godonou, Nadia Tawbi. 83-101 [doi]
- Fault Injection to Reverse Engineer DES-Like CryptosystemsHélène Le Bouder, Sylvain Guilley, Bruno Robisson, Assia Tria. 105-121 [doi]
- Software CamouflageSylvain Guilley, Damien Marion, Zakaria Najm, Youssef Souissi, Antoine Wurcker. 122-139 [doi]
- Investigation of Parameters Influencing the Success of Optical Fault AttacksThomas Korak. 140-157 [doi]
- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation FrameworkAlireza Sadighian, José M. Fernandez, Antoine Lemay, Saman Taghavi Zargar. 161-177 [doi]
- Quantitative Evaluation of Enforcement Strategies - Position PaperVincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Charles Morisset. 178-186 [doi]
- Collusion Resistant Inference Control for Cadastral DatabasesFiras Al Khalil, Alban Gabillon, Patrick Capolsini. 189-208 [doi]
- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control ModelEugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Nikolaos L. Dellas, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris, Nora Cuppens-Boulahia, Frédéric Cuppens. 209-226 [doi]
- Formal Modelling of Content-Based Protection and Release for Access Control in NATO OperationsAlessandro Armando, Sander Oudkerk, Silvio Ranise, Konrad Wrona. 227-244 [doi]
- Computational Soundness of Symbolic Blind Signatures under Active AttackerHideki Sakurada. 247-263 [doi]
- Improved Davies-Murphy's Attack on DES RevisitedYi Lu 0002, Yvo Desmedt. 264-271 [doi]
- Yet Another Fault-Based Leakage in Non-uniform Faulty CiphertextsYang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama. 272-287 [doi]
- A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDsZeeshan Bilal, Keith Martin. 291-305 [doi]
- A More Realistic Model for Verifying Route Validity in Ad-Hoc NetworksAli Kassem, Pascal Lafourcade, Yassine Lakhnech. 306-322 [doi]
- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETsBao Liu, Lei Zhang, Josep Domingo-Ferrer. 323-335 [doi]
- CheR: Cheating Resilience in the Cloud via Smart Resource AllocationRoberto Di Pietro, Flavio Lombardi, Fabio Martinelli, Daniele Sgandurra. 339-352 [doi]
- Evaluation of Software-Oriented Block Ciphers on SmartphonesLukas Malina, Vlastimil Clupek, Zdenek Martinasek, Jan Hajny, Kimio Oguchi, Vaclav Zeman. 353-368 [doi]
- Don't Push It: Breaking iButton SecurityChristian Brandt, Michael Kasper. 369-387 [doi]
- Discovering Flaws in IDS Through Analysis of Their InputsRaphael Jamet, Pascal Lafourcade. 391-407 [doi]
- On the Reverse Engineering of the Citadel BotnetAshkan Rahimian, Raha Ziarati, Stere Preda, Mourad Debbabi. 408-425 [doi]
- The Carna Botnet Through the Lens of a Network TelescopeErwan Le Malécot, Daisuke Inoue. 426-441 [doi]