Abstract is missing.
- Blueprints of an Automated Android Test-BedFrançois Gagnon, Jérémie Poisson, Simon Frenette, Frédéric Lafrance, Simon Hallé, Frédéric Michaud. 3-25 [doi]
- Trust Revoked - Practical Evaluation of OCSP- and CRL-Checking ImplementationsManuel Koschuch, Ronald Wagner. 26-33 [doi]
- A Robust Stream Control Transmission Protocol (SCTP)-Based Authentication ProtocolMalek Rekik, Amel Makhlouf, Mohammad S. Obaidat, Faouzi Zarai. 34-57 [doi]
- Revenue Streams and Value Propositions of Cloud-Based High Performance Computing in Higher EducationMarkus Eurich, Roman Boutellier. 61-75 [doi]
- Decision Support in the Field of Online Marketing - Development of a Data LandscapeThomas Hansmann, Florian Nottorf. 76-95 [doi]
- Control & Value Trade-Offs in Handling User-Data: The Example of Location-Based-ServicesJonas Breuer, Uschi Buchinger, Heritiana Ranaivoson, Pieter Ballon. 96-111 [doi]
- Zero-Forcing Equalisation of Measured Optical Multimode MIMO ChannelsAndré Sandmann, Andreas Ahrens, Steffen Lochmann. 115-130 [doi]
- ARES: An Adaptive, Resilient, Estimation Scheme for Enforcing Bandwidth Allocation in XG-PON SystemsPanagiotis G. Sarigiannidis, Georgios I. Papadimitriou, Petros Nicopolitidis, Vasiliki L. Kakali, Emmanouel A. Varvarigos, Konstantinos Yiannopoulos. 131-151 [doi]
- Combined Polynomial Prediction and Max-Min Fair Bandwidth Redistribution in Ethernet Passive Optical NetworksIoannis Mamounakis, Konstantinos Yiannopoulos, Georgios I. Papadimitriou, Emmanouel A. Varvarigos. 152-168 [doi]
- Transmission Laser Beam Control Techniques for Active Free Space Optics SystemsTakeshi Tsujimura, Kiyotaka Izumi, Koichi Yoshida. 169-188 [doi]
- Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network IntrusionsPaulo Shakarian, Nimish Kulkarni, Massimiliano Albanese, Sushil Jajodia. 191-211 [doi]
- Adaptive Oblivious Transfer Realizing Expressive Hidden Access PolicyVandana Guleria, Ratna Dutta. 212-233 [doi]
- An Anonymous Proxy Multi-signature with AccountablilityVishal Saraswat, Rajeev Anand Sahu. 234-254 [doi]
- Certificateless and Identity based Authenticated Key Exchange ProtocolsSaikrishna Badrinarayanan, C. Pandu Rangan. 255-277 [doi]
- Browser Blacklists: The Utopia of Phishing ProtectionNikolaos Tsalis, Nikos Virvilis, Alexios Mylonas, Theodore K. Apostolopoulos, Dimitris Gritzalis. 278-293 [doi]
- Formal Security Analysis of Traditional and Electronic ExamsJannik Dreier, Rosario Giustolisi, Ali Kassem 0001, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan. 294-318 [doi]
- On the Feasibility of Side-Channel Attacks in a Virtualized EnvironmentTsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri. 319-339 [doi]
- SOLDI: Secure Off-Line Disposable CredIts to Secure Mobile Micro PaymentsVanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini. 340-362 [doi]
- Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight ModelSonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre. 363-379 [doi]
- Detection of Clothes Change Fusing Color, Texture, Edge and Depth InformationDimitrios Sgouropoulos, Theodoros Giannakopoulos, Giorgos Siantikos, Evaggelos Spyrou, Stavros J. Perantonis. 383-392 [doi]
- Many-Core HEVC Encoding Based on Wavefront Parallel Processing and GPU-accelerated Motion EstimationStefan Radicke, Jens-Uwe Hahn, Qi Wang, Christos Grecos. 393-417 [doi]
- Automatic Calibration of Soccer Scenes Using Feature DetectionPatrik Goorts, Steven Maesen, Yunjun Liu, Maarten Dumont, Philippe Bekaert, Gauthier Lafruit. 418-434 [doi]
- Real-Time Edge-Sensitive Local Stereo Matching with Iterative Disparity RefinementMaarten Dumont, Patrik Goorts, Steven Maesen, Gauthier Lafruit, Philippe Bekaert. 435-456 [doi]
- Performance Enhancement of Indoor Powerline Communication Using Improved Error Correction CodesYassine Himeur, Abdelkrim Boukabou. 457-472 [doi]
- Performance Evaluation of Acoustic Feedback Cancellation Methods in Single-Microphone and Multiple-Loudspeakers Public Address SystemsBruno C. Bispo, Diamantino Freitas. 473-495 [doi]
- Bit- and Power Allocation in GMD and SVD-Based MIMO SystemsAndreas Ahrens, Francisco Cano-Broncano, César Benavente-Peces. 499-517 [doi]
- ISEND: An Improved Secure Neighbor Discovery Protocol for Wireless NetworksImen El Bouabidi, Salima Smaoui, Faouzi Zarai, Mohammad S. Obaidat, Lotfi Kamoun. 518-535 [doi]