Abstract is missing.
- High-performance Pipelined FPGA Implementation of the Elliptic Curve Cryptography over GF (2n)Salah Harb, M. Omair Ahmad, M. N. S. Swamy. 15-24 [doi]
- I Want to Break Square-free: The 4p - 1 Factorization Method and Its RSA Backdoor ViabilityVladimir Sedlacek, Dusan Klinec, Marek Sýs, Petr Svenda, Vashek Matyas. 25-36 [doi]
- Enriching Threat Intelligence Platforms CapabilitiesMario Faiella, Gustavo Gonzalez Granadillo, Ibéria Medeiros, Rui Azevedo, Susana Gonzalez Zarzosa. 37-48 [doi]
- Efficient Secure Floating-point Arithmetic using Shamir Secret SharingOctavian Catrina. 49-60 [doi]
- BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON Signature SchemeSarah McCarthy, James Howe, Neil Smyth, Séamus Brannigan, Máire O'Neill. 61-71 [doi]
- On the Energy Consumption of Quantum-resistant Cryptographic Software Implementations Suitable for Wireless Sensor NetworksMichael Heigl, Laurin Doerr, Martin Schramm, Dalibor Fiala. 72-83 [doi]
- A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device CommunicationsOthmane Nait Hamoud, Tayeb Kenaza, Yacine Challal. 84-95 [doi]
- A Comparative Study of Misapplied Crypto in Android and iOS ApplicationsJohannes Feichtner. 96-108 [doi]
- BTG-RKASE: Privacy Preserving Revocable Key Aggregate Searchable Encryption with Fine-grained Multi-delegation & Break-The-Glass Access ControlMukti Padhya, Devesh C. Jinwala. 109-124 [doi]
- An Investigation into the "Beautification" of Security CeremoniesGiampaolo Bella, Karen Renaud, Diego Sempreboni, Luca Viganò 0001. 125-136 [doi]
- Universal Encoding for Provably Irreversible Data ErasingMarek Klonowski, Tomasz Struminski, Malgorzata Sulkowska. 137-148 [doi]
- OC-ORAM: Constant Bandwidth ORAM with Smaller Block Size using Oblivious Clear AlgorithmLinru Zhang, Gongxian Zeng, Yuechen Chen, Nairen Cao, Siu-Ming Yiu, Zheli Liu. 149-160 [doi]
- What Are the Threats? (Charting the Threat Models of Security Ceremonies)Diego Sempreboni, Giampaolo Bella, Rosario Giustolisi, Luca Viganò 0001. 161-172 [doi]
- PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced StorageDimitrios Vasilopoulos, Melek Önen, Refik Molva. 173-186 [doi]
- Prying CoW: Inferring Secrets across Virtual Machine BoundariesGerald Palfinger, Bernd Prünster, Dominik Ziegler. 187-197 [doi]
- A Taxonomy of Metrics and Tests to Evaluate and Validate Properties of Industrial Intrusion Detection SystemsCyntia Vargas, Birgit Vogel-Heuser. 201-210 [doi]
- DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph ModellingMuhammad Ikram, Pierrick Beaume, Mohamed Ali Kâafar. 211-219 [doi]
- Secure Strassen-Winograd Matrix Multiplication with MapReduceRadu Ciucanu, Matthieu Giraud, Pascal Lafourcade 0001, Lihua Ye. 220-227 [doi]
- DABSTERS: Distributed Authorities using Blind Signature to Effect Robust Security in e-VotingMarwa Chaieb, Mirko Koscina, Souheib Yousfi, Pascal Lafourcade 0001, Riadh Robbana. 228-235 [doi]
- Secure Intersection with MapReduceRadu Ciucanu, Matthieu Giraud, Pascal Lafourcarde, Lihua Ye. 236-243 [doi]
- A Software-defined Networking-based Detection and Mitigation Approach against KRACKYi Li, Marcos Serrano, Tommy Chin, Kaiqi Xiong, Jing Lin. 244-251 [doi]
- Master of Puppets: Trusting Silicon in the Fight for Practical Security in Fully Decentralised Peer-to-Peer NetworksBernd Prünster, Edona Fasllija, Dominik Mocher. 252-259 [doi]
- A Robust Anaglyph 3D Video Watermarking based on Multi-sprite GenerationDorra Dhaou, Saoussen Ben Jabra, Ezzeddine Zagrouba. 260-267 [doi]
- A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native AppsAmir Sharif, Roberto Carbone, Silvio Ranise, Giada Sciarretta. 268-275 [doi]
- A Tool-assisted Methodology for the Data Protection Impact AssessmentSalimeh Dashti, Silvio Ranise. 276-283 [doi]
- Method for Vector Map Protection based on using of a Watermark Image as a Secondary CarrierYuliya Vybornova, Vladislav Sergeev. 284-293 [doi]
- Dynamic Taint-tracking: Directions for Future ResearchFabian Berner, Johannes Sametinger. 294-305 [doi]
- Mind the Gap: Finding What Updates Have (Really) Changed in Android ApplicationsJohannes Feichtner, Lukas Neugebauer, Dominik Ziegler. 306-313 [doi]
- Fides: Unleashing the Full Potential of Remote AttestationBernd Prünster, Gerald Palfinger, Christian Kollmann. 314-321 [doi]
- ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge TechniquesMartin Schanzenbach, Thomas Kilian, Julian Schütte, Christian Banse. 325-332 [doi]
- Indirect Data Representation Via Offset Vectoring: A Code-integrity-driven In-memory Data Regeneration SchemeErik Sonnleitner, Marc Kurz, Alexander Palmanshofer. 333-340 [doi]
- An Efficient FHE Scheme to Secure Cloud ComputingKhalil Hariss, Abed Ellatif Samhat, Maroun Chamoun. 341-349 [doi]
- Potential Impacts in Citizens' Privacy of using Federated Identity Management to Offer e-Government ServicesJorge Navas 0002, Marta Beltrán. 350-355 [doi]
- Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the CloudKhazam Alhamdan, Tassos Dimitriou, Imtiaz Ahmad. 356-362 [doi]
- PrivySharing: A Blockchain-based Framework for Integrity and Privacy-preserving Data Sharing in Smart CitiesImran Makhdoom, Ian Zhou, Mehran Abolhasan, Justin Lipman, Wei Ni 0001. 363-371 [doi]
- LASER: Lightweight and Secure Remote Keyless Entry ProtocolVanesa Daza, Xavier Salleras. 372-377 [doi]
- Distributed Anomaly Detection of Single Mote Attacks in RPL NetworksNicolas M. Müller, Pascal Debus, Daniel Kowatsch, Konstantin Böttinger. 378-385 [doi]
- Hunting Traits for CryptojackersGabriel Jozsef Berecz, István Gergely Czibula. 386-393 [doi]
- PRE as a Service within Smart Grid CityAnass Sbai, Cyril Drocourt, Gilles Dequen. 394-401 [doi]
- Entropy and Security of Pseudorandom Number Generators based on Chaotic IterationsLuigi Marangio, Christophe Guyeux. 402-407 [doi]
- Evaluation of Intrusion Detection Systems in IPv6 NetworksMax Schrötter, Thomas Scheffler, Bettina Schnor. 408-416 [doi]
- "Open Weakness and Vulnerability Modeler" (OVVL): An Updated Approach to Threat ModelingAndreas Schaad, Tobias Reski. 417-424 [doi]
- Differential Privacy meets Verifiable Computation: Achieving Strong Privacy and Integrity GuaranteesGeorgia Tsaloli, Aikaterini Mitrokotsa. 425-430 [doi]
- On the Efficacy of New Privacy Attacks against 5G AKAHaibat Khan, Keith M. Martin. 431-438 [doi]
- Security for Distributed Deep Neural Networks: Towards Data Confidentiality & Intellectual Property ProtectionLaurent Gomez, Marcus Wilhelm, José Márquez, Patrick Duverger. 439-447 [doi]
- Keystroke Dynamics Anonymization SystemDenis Migdal, Christophe Rosenberger. 448-455 [doi]
- Web Application for Privacy-preserving Scheduling using Secure ComputationÁgnes Kiss, Oliver Schick, Thomas Schneider 0003. 456-463 [doi]
- LADS: A Live Anomaly Detection System based on Machine Learning MethodsGustavo Gonzalez Granadillo, Rodrigo Diaz, Ibéria Medeiros, Susana Gonzalez Zarzosa, Dawid Machnicki. 464-469 [doi]
- ECDSA-compatible Delegable Undeniable SignatureSam Ng, Tomás Tauber. 470-477 [doi]
- Here and There at Once, with my Mobile Phone!Ioana Boureanu, David Gerault, James Lewis. 478-484 [doi]
- Decentralized Privacy-preserving Access for Low Emission ZonesCarles Angles-Tafalla, Sara Ricci, Petr Dzurenda, Jan Hajny, Jordi Castellà-Roca, Alexandre Viejo. 485-491 [doi]
- Identity-based Conditional Privacy-Preserving Authentication Scheme Resistant to Malicious Subliminal Setting of Ephemeral SecretPatryk Koziel, Lukasz Krzywiecki, Damian Stygar. 492-497 [doi]
- Integration of a Secure Physical Element as a Trusted Oracle in a Hyperledger BlockchainAndreas Schaad, Tobias Reski, Oliver Winzenried. 498-503 [doi]
- RACE: Randomized Counter Mode of Authenticated Encryption using Cellular AutomataTapadyoti Banerjee, Bijoy Das, Deval Mehta, Dipanwita Roy Chowdhury. 504-509 [doi]
- Is Privacy a Myth for Facebook Users?Vishwas T. Patil, R. K. Shyamasundar. 510-516 [doi]
- Cryptanalysis of Homomorphic Encryption Schemes based on the Aproximate GCD ProblemTikaram Sanyashi, Darshil Desai, Bernard Menezes. 517-522 [doi]
- Reducing Computational Cost in IoT Cyber Security: Case Study of Artificial Immune System AlgorithmIdris Zakariyya, M. Omar Al-Kadri, Harsha Kalutarage, Andrei Petrovski. 523-528 [doi]
- An Analysis of User Behaviors in Phishing eMail using Machine Learning TechniquesYi Li, Kaiqi Xiong, Xiangyang Li. 529-534 [doi]
- Semantic-based Obligation for Context-Based Access ControlMouiad Al-Wahah, Ahmed Saaudi, Csilla Farkas. 535-540 [doi]