Abstract is missing.
- Optimization Problems in Infrastructure SecurityEvangelos Kranakis, Danny Krizanc. 3-13 [doi]
- Secure Distributed Computation on Private InputsGeoffroy Couteau, Thomas Peters, David Pointcheval. 14-26 [doi]
- Survey of Distance Bounding Protocols and ThreatsAgnès Brelurut, David Gerault, Pascal Lafourcade. 29-49 [doi]
- Inferring Touch from Motion in Real World DataPascal Bissig, Philipp Brandes, Jonas Passerini, Roger Wattenhofer. 50-65 [doi]
- Point-Counting Method for Embarrassingly Parallel Evaluation in Secure ComputationToomas Krips, Jan Willemson. 66-82 [doi]
- Security Mechanisms Planning to Enforce Security PoliciesAnis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard. 85-101 [doi]
- Runtime Enforcement with Partial ControlRaphaël Khoury, Sylvain Hallé. 102-116 [doi]
- Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting CodesMasaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba. 117-133 [doi]
- Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic PropertiesPascal Lafourcade, Maxime Puys. 137-155 [doi]
- AnBx: Automatic Generation and Verification of Security Protocols ImplementationsPaolo Modesti. 156-173 [doi]
- Evaluating Obfuscation Security: A Quantitative ApproachRabih Mohsen, Alexandre Miranda Pinto. 174-192 [doi]
- Fast and Effective Clustering of Spam Emails Based on Structural SimilarityMina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli. 195-211 [doi]
- A Closer Look at the HTTP and P2P Based Botnets from a Detector's PerspectiveFariba Haddadi, A. Nur Zincir-Heywood. 212-228 [doi]
- Obfuscation Code Localization Based on CFG Generation of MalwareNguyen Minh Hai, Mizuhito Ogawa, Quan Thanh Tho. 229-247 [doi]
- Runtime Monitoring of Stream Logic FormulaeSylvain Hallé, Raphaël Khoury. 251-258 [doi]
- MIME: A Formal Approach to (Android) Emulation Malware AnalysisFabio Bellini, Roberto Chiodi, Isabella Mastroeni. 259-267 [doi]
- Information Classification EnablersErik Bergström, Rose-Marie Åhlfeldt. 268-276 [doi]
- Information Flow Control on a Multi-paradigm Web Application for SQL Injection PreventionMeriam Ben-Ghorbel-Talbi, François Lesueur, Gaetan Perrin. 277-285 [doi]
- Searchable Encryption in Apache CassandraTim Waage, Ramaninder Singh Jhajj, Lena Wiese. 286-293 [doi]
- AndroSSL: A Platform to Test Android Applications Connection SecurityFrançois Gagnon, Marc-Antoine Ferland, Marc-Antoine Fortier, Simon Desloges, Jonathan Ouellet, Catherine Boileau. 294-302 [doi]
- Onion Routing in Deterministic Delay Tolerant NetworksAdrian Antunez-Veas, Guillermo Navarro-Arribas. 303-310 [doi]
- Security Enforcement by Rewriting: An Algebraic ApproachGuangye Sui, Mohamed Mejri. 311-321 [doi]