Abstract is missing.
- On Acoustic Covert Channels Between Air-Gapped SystemsBrent Carrara, Carlisle Adams. 3-16 [doi]
- Location-Dependent EM Leakage of the ATxmega MicrocontrollerThomas Korak. 17-32 [doi]
- Privacy-Preserving Public Auditing in Cloud Computing with Data DeduplicationNaelah Alkhojandi, Ali Miri. 35-48 [doi]
- A Maximum Variance Approach for Graph AnonymizationHiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch. 49-64 [doi]
- Privacy by Design: On the Conformance Between Protocols and ArchitecturesVinh-Thong Ta, Thibaud Antignac. 65-81 [doi]
- Moving Target Defense Against Cross-Site Scripting Attacks (Position Paper)Joe Portner, Joel Kerr, Bill Chu. 85-91 [doi]
- Combining High-Level and Low-Level Approaches to Evaluate Software Implementations Robustness Against Multiple Fault Injection AttacksLionel Rivière, Marie-Laure Potet, Thanh-Ha Le, Julien Bringer, Hervé Chabanne, Maxime Puys. 92-111 [doi]
- Malware Message Classification by Dynamic AnalysisGuillaume Bonfante, Jean-Yves Marion, Thanh Dinh Ta. 112-128 [doi]
- A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc NetworksMyria Bouhaddi, Mohammed Said Radjef, Kamel Adi. 131-146 [doi]
- Optimizing TLS for Low Bandwidth EnvironmentsDiego A. Ortiz-Yepes. 147-167 [doi]
- Automating MAC Spoofer Evidence Gathering and Encoding for InvestigationsSerguei A. Mokhov, Michael J. Assels, Joey Paquet, Mourad Debbabi. 168-183 [doi]
- HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access ControlDaniel Servos, Sylvia L. Osborn. 187-204 [doi]
- Logical Method for Reasoning About Access Control and Data Flow Control ModelsLuigi Logrippo. 205-220 [doi]
- A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security PoliciesAhmed Khoumsi, Wadie Krombi, Mohammed Erradi. 221-236 [doi]
- Debating Cybersecurity or Securing a Debate? - (Position Paper)Fabio Martinelli, Francesco Santini. 239-246 [doi]
- Formal Verification of e-Reputation ProtocolsAli Kassem, Pascal Lafourcade, Yassine Lakhnech. 247-261 [doi]
- (In)Corruptibility of Routing ProtocolsRaphaël Jamet, Pascal Lafourcade. 262-276 [doi]
- Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing SchemeWen Wen, Binod Vaidya, Dimitrios Makrakis, Carlisle Adams. 279-293 [doi]
- Composable Oblivious Extended PermutationsPeeter Laud, Jan Willemson. 294-310 [doi]
- Benchmarking Encrypted Data Storage in HBase and Cassandra with YCSBTim Waage, Lena Wiese. 311-325 [doi]
- Data Confirmation for Botnet Traffic AnalysisFariba Haddadi, A. Nur Zincir-Heywood. 329-336 [doi]
- Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone AppsMariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli. 337-346 [doi]
- A Responsive Defense Mechanism Against DDoS AttacksNegar Mosharraf, Anura P. Jayasumana, Indrakshi Ray. 347-355 [doi]
- Automated Extraction of Vulnerability Information for Home Computer SecuritySachini S. Weerawardhana, Subhojeet Mukherjee, Indrajit Ray, Adele E. Howe. 356-366 [doi]
- A Formal Approach to Automatic Testing of Security Policies Specified in XACMLMohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli. 367-374 [doi]