Abstract is missing.
- Securing Internet-of-ThingsGuang Gong. 3-16 [doi]
- Privacy and Ethical Challenges in Big DataSébastien Gambs. 17-26 [doi]
- Decentralized Dynamic Security Enforcement for Mobile Applications with CliSeAuDroidTobias Hamann, Heiko Mantel. 29-45 [doi]
- Mobile Travel CredentialsDavid Bissessar, Maryam Hezaveh, Fayzah Alshammari, Carlisle Adams. 46-58 [doi]
- Cloud Security Auditing: Major Approaches and Existing ChallengesSuryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi. 61-77 [doi]
- Secure Joins with MapReduceXavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade 0001, Lihua Ye. 78-94 [doi]
- Daedalus: Network Anomaly Detection on IDS Stream LogsAniss Chohra, Mourad Debbabi, Paria Shirani. 95-111 [doi]
- Configuring Data Flows in the Internet of Things for Security and Privacy RequirementsLuigi Logrippo, Abdelouadoud Stambouli. 115-130 [doi]
- Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper)Tahir Ahmad, Silvio Ranise. 131-139 [doi]
- Evading Deep Neural Network and Random Forest Classifiers by Generating Adversarial SamplesErick Eduardo Bernal Martinez, Bella Oh, Feng Li, Xiao Luo. 143-155 [doi]
- Protection of Systems Against Fuzzing AttacksLéopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet. 156-172 [doi]
- A Comparative Study Across Static and Dynamic Side-Channel CountermeasuresYuri Gil Dantas, Tobias Hamann, Heiko Mantel. 173-189 [doi]
- Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private OperationsHibiki Ono, Yoshifumi Manabe. 193-207 [doi]
- Cryptographic Formula ObfuscationGiovanni Di Crescenzo. 208-224 [doi]
- Fault Analysis of the New Ukrainian Hash Function Standard: KupynaOnur Duman, Amr M. Youssef. 225-240 [doi]
- When Fault Injection Collides with Hardware ComplexitySebanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, Jean-Louis Lanet. 243-256 [doi]
- A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper)Mariana Segovia, Ana Rosa Cavalli, Nora Cuppens, Joaquín García-Alfaro. 257-264 [doi]
- Mining Relationship-Based Access Control Policies from Incomplete and Noisy DataThang Bui, Scott D. Stoller, Jiajie Li. 267-284 [doi]
- Fine-Grained Access Control for MicroservicesAntonio Nehme, Vitor Jesus, Khaled Mahbub, Ali E. Abdallah. 285-300 [doi]
- Achieving Mobile-Health Privacy Using Attribute-Based Access ControlVignesh M. Pagadala, Indrakshi Ray. 301-316 [doi]