Abstract is missing.
- Secure Benchmarking using Electronic VotingVivek Agrawal, Einar Arthur Snekkenes. 191-206 [doi]
- Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input LeakageFrançois Gérard, Veronika Kuchta, Rajeev Anand Sahu, Gaurav Sharma 0006, Olivier Markowitch. 207-218 [doi]
- Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality LeaksNikolaos Tsalis, George Stergiopoulos, Evangelos Bitsikas, Dimitris Gritzalis, Theodore K. Apostolopoulos. 219-229 [doi]
- DRANKULA: A McEliece-like Rank Metric based Cryptosystem ImplementationAmeera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Víctor Mateu. 230-241 [doi]
- On the Security of Linear Sketch Schemes against Recovering AttacksTakahiro Matsuda 0002, Kenta Takahashi, Goichiro Hanaoka. 242-253 [doi]
- A Steganogaphic Scheme for MAC-Independent Opportunistic Routing and Encoding (MORE) ProtocolMohamed Amine Belhamra, El Mamoun Souidi. 254-264 [doi]
- BDABE - Blockchain-based Distributed Attribute based EncryptionGeorg Bramm, Mark Gall, Julian Schütte. 265-276 [doi]
- An Optimistic Fair Exchange E-commerce Protocol for Complex TransactionsCatalin V. Bîrjoveanu, Mirela Bîrjoveanu. 277-288 [doi]
- An Extended Case Study about Securing Smart Home Hubs through N-version ProgrammingIgor Zavalyshyn, Nuno O. Duarte, Nuno Santos 0001. 289-300 [doi]
- Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoTSana Belguith, Nesrine Kaaniche, Giovanni Russello. 301-312 [doi]
- Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and InferenceLaurent Gomez, Alberto Ibarrondo, José Márquez, Patrick Duverger. 313-320 [doi]
- SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access ControlNesrine Kaaniche, Maryline Laurent. 321-333 [doi]
- A Blockchain based Access Control SchemeMaryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse. 334-342 [doi]
- Distortion-free Watermarking Scheme for Compressed Data in Columnar DatabaseWaheeb Yaqub, Ibrahim Kamel, Zeyar Aung. 343-353
- An Efficient Privacy-preserving Recommender System for e-Healthcare SystemsDanilo Verhaert, Majid Nateghizad, Zekeriya Erkin. 354-365 [doi]
- Anonymous Data Collection Scheme from Short Group SignaturesJan Hajny, Petr Dzurenda, Lukas Malina, Sara Ricci. 366-375 [doi]
- Unobtrusive Psychological Profiling for Risk AnalysisAdam Szekeres, Einar Arthur Snekkenes. 376-386 [doi]
- Fuzzy Logic based Model for Energy Consumption Trust Estimation in Electric Vehicular NetworksIlhem Souissi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Saïd. 387-399 [doi]
- Static Security Certification of Programs via Dynamic LabellingSandip Ghosal, R. K. Shyamasundar, N. V. Narendra Kumar. 400-411 [doi]
- Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance TechniquesMohammed Noraden Alsaleh, Ehab Al-Shaer, Qi Duan. 412-423 [doi]
- Algebraic Side-Channel Attacks on Masked Implementations of AESLuk Bettale, Emmanuelle Dottax, Mailody Ramphort. 424-435 [doi]
- Efficient Index-based Search Protocols for Encrypted DatabasesMajid Nateghizad, Zekeriya Erkin, Reginald L. Lagendijk. 436-447 [doi]
- A Quantitative Framework to Model Advanced Persistent ThreatsLuan Huy Pham, Massimiliano Albanese, Benjamin W. Priest. 448-459 [doi]
- Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash ChainsYuichi Kaji, Jason Paul Cruz, Yoshio Yatani. 463-470 [doi]
- Big Data Anonymization Requirements vs Privacy ModelsJosep Domingo-Ferrer. 471-478 [doi]
- Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis TasksAlfredo Cuzzocrea, Fabio Martinelli, Francesco Mercaldo. 479-487 [doi]
- Privacy-preserving Distributed Access Control for Medical DataChristian Maulany, Majid Nateghizad, Bart Mennink, Zekeriya Erkin. 488-497 [doi]
- Theoretical Security Evaluation of the Human Semantic Authentication ProtocolHélène Le Bouder, Gaël Thomas 0002, Edwin Bourget, Mariem Graa, Nora Cuppens, Jean-Louis Lanet. 498-505 [doi]
- A Quantum-Secure Niederreiter Cryptosystem using Quasi-Cyclic CodesUpendra Kapshikar, Ayan Mahalanobis. 506-513
- Secure Grouping and Aggregation with MapReduceRadu Ciucanu, Matthieu Giraud, Pascal Lafourcade 0001, Lihua Ye. 514-521 [doi]
- Cost-effective Private Linear Key Agreement with Adaptive CCA Security from Prime Order Multilinear Maps and Tracing TraitorsMriganka Mandal, Ratna Dutta. 522-529 [doi]
- Combining Design by Contract and Inference Rules of Programming Logic towards Software ReliabilityNuha Aldausari, Cui Zhang, Jun Dai. 530-537 [doi]
- The AVARE PATRON - A Holistic Privacy Approach for the Internet of ThingsChristoph Stach, Sascha Alpers, Stefanie Betz, Frank Dürr, Andreas Fritsch, Kai Mindermann, Saravana Murthy Palanisamy, Gunther Schiefer, Manuela Wagner, Bernhard Mitschang, Andreas Oberweis, Stefan Wagner 0001. 538-545 [doi]
- Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining ProcessesDominik Ziegler, Bernd Prünster, Alexander Marsalek, Christian Kollmann. 546-553 [doi]
- Analysis of Man-In-The-Middle of Attack on Bitcoin AddressAbba Garba, Zhi Guan, Anran Li, Zhong Chen 0001. 554-561 [doi]
- DBStore: A TrustZone-backed Database Management System for Mobile ApplicationsPedro S. Ribeiro, Nuno Santos 0001, Nuno O. Duarte. 562-569 [doi]
- Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECCAudrey Lucas, Arnaud Tisserand. 570-577 [doi]
- Malware Detection in PDF Files using Machine LearningBonan Cuan, Aliénor Damien, Claire Delaplace, Mathieu Valois. 578-585 [doi]
- Blind PDF Document Watermarking Robust Against PCA and ICA AttacksMakram W. Hatoum, Rony Darazi, Jean-François Couchot. 586-593 [doi]
- Blockchain for IoT: The Challenges and a Way ForwardImran Makhdoom, Mehran Abolhasan, Wei Ni 0001. 594-605 [doi]
- A Machine Learning Approach for Privacy-preservation in E-business ApplicationsFatemeh Amiri, Gerald Quirchmayr, Peter Kieseberg. 609-618 [doi]
- Towards an Enhanced Security Data Analytic PlatformGustavo Gonzalez Granadillo, Susana Gonzalez Zarzosa, Mario Faiella. 619-624 [doi]
- Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoTAntoine Loiseau, Jacques J. A. Fournier. 625-631 [doi]
- A Flexible Framework for Rogue Access Point DetectionRicardo Gonçalves, Manuel Eduardo Correia, Pedro Brandão. 632-637 [doi]
- Holistic Database EncryptionWalid Rjaibi. 638-643 [doi]
- KAuth: A Strong Single Sign-On Service based on PKIPanayiotis Charalambous, Marios Karapetris, Elias Athanasopoulos. 644-649 [doi]
- PAPEETE: Private, Authorized, and Fast Personal Genomic TestingAngelo Massimo Perillo, Emiliano De Cristofaro. 650-655 [doi]
- Compact Lattice SignaturesDipayan Das, Vishal Saraswat. 656-661 [doi]
- A Novel Lattice Reduction AlgorithmDipayan Das, Vishal Saraswat. 662-667 [doi]
- Secure Authentication Solution for Cloud-based Smart City Surveillance SystemYosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga. 668-673 [doi]
- Crypto-democracy: A Decentralized Voting Scheme using Blockchain TechnologyGautam Srivastava, Ashutosh Dhar Dwivedi, Rajani Singh. 674-679 [doi]
- Evaluating the Provision of Botnet Defences using Translational Research ConceptsDilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos. 680-685 [doi]
- AVISPA versus AVANTSSAR in the Model Checking of Secure Communication ProtocolsIulian Aciobanitei, Roxana-Ioana Guinea, Mihai-Lica Pura. 686-691 [doi]
- Lightweight Ring Signatures for Decentralized Privacy-preserving TransactionsLukas Malina, Jan Hajny, Petr Dzurenda, Sara Ricci. 692-697 [doi]
- Towards a Cloud-based System for Software Protection and LicensingAndreas Schaad, Björn Grohmann, Oliver Winzenried, Ferdinand Brasser, Ahmad-Reza Sadeghi. 698-702 [doi]
- Attribute Based Signatures: The Case for AutomationLalitha Muthu Subramanian, Roopa Vishwanathan. 703-708 [doi]
- Implicit Data Integrity: Protecting User Data without MACsMichael E. Kounavis, David Durham, Sergej Deutsch, Saeedeh Komijani. 709-718 [doi]
- Towards Efficient Software Protection Obeying Kerckhoffs's Principle using Tamper-proof HardwareBrandon Broadnax, Matthias Huber, Bernhard Löwe, Jörn Müller-Quade, Patrik Scheidecker. 719-724 [doi]
- Learning Plaintext in Galbraith's LWE CryptosystemTikaram Sanyashi, Sreyans Nahata, Rushang Dhanesha, Bernard Menezes. 725-731 [doi]
- Phylogenetic Analysis for Ransomware Detection and Classification into FamiliesFabio Martinelli, Francesco Mercaldo, Christina Michailidou, Andrea Saracino. 732-737
- Blockchain-based Consents Management for Personal Data Processing in the IoT EcosystemKonstantinos Rantos, George Drosatos, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou. 738-743 [doi]