Abstract is missing.
- Helper-in-the-Middle: Supporting Web Application Scanners Targeting Industrial Control SystemsAnne Borcherding, Steffen Pfrang, Christian Haas 0002, Albrecht Weiche, Jürgen Beyerer. 27-38 [doi]
- Termination of Ethereum's Smart ContractsThomas Genet, Thomas P. Jensen, Justine Sauvage. 39-51 [doi]
- Avoiding Network and Host Detection using Packet Bit-maskingGeorge Stergiopoulos, Eirini Lygerou, Nikolaos Tsalis, Dimitris Tomaras, Dimitris Gritzalis. 52-63 [doi]
- FPGA-based McEliece Cryptosystem using Non-linear Convolutional CodesMichael Ekonde Sone. 64-75 [doi]
- CROOT: Code-based Round-Optimal Oblivious TransferNicolas Aragon, Olivier Blazy, Neals Fournaise, Philippe Gaborit. 76-85 [doi]
- DCBC: A Distributed High-performance Block-Cipher Mode of OperationOussama Trabelsi, Lilia Sfaxi, Riadh Robbana. 86-97 [doi]
- Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid SystemsMarco Anisetti, Claudio Agostino Ardagna, Nicola Bena, Ernesto Damiani. 98-109 [doi]
- An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud DataHamza Hammami, Mohammad S. Obaidat, Sadok Ben Yahia. 110-117 [doi]
- Decentralized Multi-Client Attribute Based Functional EncryptionYuechen Chen, Linru Zhang, Siu-Ming Yiu. 118-129 [doi]
- Optimal Transport Layer for Secure ComputationMarkus Brandt, Claudio Orlandi, Kris Shrishak, Haya Shulman. 130-141 [doi]
- An Identity-matching Process to Strengthen Trust in Federated-identity ArchitecturesPaul Marillonnet, Mikaël Ates, Maryline Laurent, Nesrine Kaaniche. 142-154 [doi]
- Ensuring the Integrity of Outsourced Web ScriptsJosselin Mignerey, Cyrille Mucchietto, Jean-Baptiste Orfila. 155-166 [doi]
- Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy SecretsItzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini. 167-179 [doi]
- FALCO: Detecting Superfluous JavaScript Injection Attacks using Website FingerprintsChih Chun Liu, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim. 180-191 [doi]
- Beyond Black and White: Combining the Benefits of Regular and Incognito Browsing ModesJohn Korniotakis, Panagiotis Papadopoulos, Evangelos P. Markatos. 192-200 [doi]
- Practically Efficient Attribute-based Encryption for Compartmented Access StructuresFerucio Laurentiu Tiplea, Alexandru Ionita, Anca-Maria Nica. 201-212 [doi]
- Round-optimal Constant-size Blind SignaturesOlivier Blazy, Laura Brouilhet, Céline Chevalier, Neals Fournaise. 213-224 [doi]
- Prov-Trust: Towards a Trustworthy SGX-based Data Provenance SystemNesrine Kaaniche, Sana Belguith, Maryline Laurent, Ashish Gehani, Giovanni Russello. 225-237 [doi]
- A Failure Rate Model of Bit-flipping Decoders for QC-LDPC and QC-MDPC Code-based CryptosystemsMarco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini. 238-249 [doi]
- Exploring Current E-mail Cyber Threats using Authenticated SMTP HoneypotLukás Zobal, Dusan Kolár, Jakub Kroustek. 253-262 [doi]
- Optimizing dm-crypt for XTS-AES: Getting the Best of Atmel Cryptographic Co-processorsLevent Demir, Mathieu Thiery, Vincent Roca, Jean-Michel Tenkes, Jean-Louis Roch. 263-270 [doi]
- cipherPath: Efficient Traversals over Homomorphically Encrypted PathsGeorg Bramm, Julian Schütte. 271-278 [doi]
- A White-Box Encryption Scheme using Physically Unclonable FunctionsSandra Rasoamiaramanana, Marine Minier, Gilles Macario-Rat. 279-286 [doi]
- Towards Understanding Man-on-the-Side Attacks (MotS) in SCADA NetworksPeter Maynard, Kieran McLaughlin. 287-294 [doi]
- Towards Secure Edge-assisted Image Sharing for Timely Disaster Situation AwarenessJing Yao, Yifeng Zheng, Cong Wang 0001, Surya Nepal. 295-301 [doi]
- Evasive Windows Malware: Impact on Antiviruses and Possible CountermeasuresCédric Herzog, Valérie Viet Triem Tong, Pierre Wilke, Arnaud Van Straaten, Jean-Louis Lanet. 302-309 [doi]
- Security Analysis of ElGamal ImplementationsMohamad El Laz, Benjamin Grégoire, Tamara Rezk. 310-321 [doi]
- Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent HashingSatoshi Obana, Maki Yoshida. 322-329 [doi]
- Signatures to Go: A Framework for Qualified PDF Signing on Mobile DevicesEmina Ahmetovic, Thomas Lenz, Christian Kollmann. 330-339 [doi]
- Privacy-Preserving Greater-Than Integer Comparison without Binary DecompositionSigurd Eskeland. 340-348 [doi]
- Multi-Stakeholder Cybersecurity Risk Assessment for Data ProtectionMajid Mollaeefar, Alberto Siena, Silvio Ranise. 349-356 [doi]
- A Novel Anonymous Authentication and Key Agreement Scheme for Smart GridHamza Hammami, Mohammad S. Obaidat, Sadok Ben Yahia. 357-362 [doi]
- SENSSE: Simple, Efficient Searchable Symmetric Encryption for Sensor NetworksBojan Spasic, Olivier Markowitch, Philippe Thiran. 363-371 [doi]
- Linear Generalized ElGamal Encryption SchemePascal Lafourcade 0001, Léo Robert, Demba Sow. 372-379 [doi]
- Accelerating Homomorphic Encryption using Approximate Computing TechniquesShabnam Khanna, Ciara Rafferty. 380-387 [doi]
- This Selfie Does Not Exist: On the Security of Electroneum Cloud MiningAlexander Marsalek, Edona Fasllija, Dominik Ziegler. 388-396 [doi]
- ProteiNN: Privacy-preserving One-to-Many Neural Network ClassificationsBeyza Bozdemir, Orhan Ermis, Melek Önen. 397-404 [doi]
- Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data SplittingNathanaël Denis, Pierre Chaffardon, Denis Conan, Maryline Laurent, Sophie Chabridon, Jean Leneutre. 405-414 [doi]
- Differentially Private Graph Publishing and Randomized Response for Collaborative FilteringJulián Salas, Vicenç Torra. 415-422 [doi]
- A Machine-learning based Unbiased Phishing Detection ApproachHossein Shirazi, Landon Zweigle, Indrakshi Ray. 423-430 [doi]
- Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control PoliciesMarius Schlegel, Peter Amthor 0001. 431-442 [doi]
- Solving Set Relations with Secure Bloom Filters Keeping Cardinality PrivateLouis Tajan, Dirk Westhoff, Frederik Armknecht. 443-450 [doi]
- Identity Verification and Fraud Detection During Online Exams with a Privacy Compliant Biometric SystemM. A. Haytom, Christophe Rosenberger, Christophe Charrier, C. Zhu, C. Regnier. 451-458 [doi]
- VIP Blowfish Privacy in Communication GraphsMohamed Nassar 0001, Elie Chicha, Bechara al Bouna, Richard Chbeir. 459-467 [doi]
- Droppix: Towards More Realistic Video FingerprintingPrzemyslaw Blaskiewicz, Marek Klonowski, Piotr Syga. 468-476 [doi]
- Software Emulation of Quantum Resistant Trusted Platform ModulesLuís Fiolhais, Paulo Martins 0002, Leonel Sousa. 477-484 [doi]
- Formal Accuracy Analysis of a Biometric Data Transformation and Its Application to Secure Template GenerationShoukat Ali, Koray Karabina, Emrah Karagoz. 485-496 [doi]
- SwaNN: Switching among Cryptographic Tools for Privacy-preserving Neural Network PredictionsGamze Tillem, Beyza Bozdemir, Melek Önen. 497-504 [doi]
- Deconstructing the Decentralization TrilemmaHarry Halpin. 505-512 [doi]
- Towards Language Support for Model-based Security Policy EngineeringPeter Amthor 0001, Marius Schlegel. 513-521 [doi]
- Exploiting Hot Spots in Heuristic Safety Analysis of Dynamic Access Control ModelsMarius Schlegel, Winfried E. Kühnhauser. 522-532 [doi]
- CP-ABE Scheme Satisfying Constant-size Keys based on ECCNishant Raj, Alwyn Roshan Pais. 535-540 [doi]
- Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based EncryptionPuneet Bakshi, Sukumar Nandi. 541-546 [doi]
- Efficient Access-control in the IIoT through Attribute-Based Encryption with Outsourced DecryptionDominik Ziegler, Alexander Marsalek, Bernd Prünster, Josef Sabongui. 547-552 [doi]
- Practical Predicate Encryption for Inner ProductYi-Fan Tseng, Zi-Yuan Liu, Raylin Tso. 553-558 [doi]
- Securing Device-to-Cloud Interactions in the Internet of Things Relying on Edge DevicesElías Grande, Marta Beltrán. 559-564 [doi]
- Under Pressure: Pushing Down on Me - Touch Sensitive Door Handle to Identify Users at Room EntryChristian Tietz, Eric Klieme, Rachel Brabender, Teresa Lasarow, Lukas Rambold, Christoph Meinel. 565-571 [doi]
- Practical Hash-based Anonymity for MAC AddressesJunade Ali, Vladimir Dyo. 572-579 [doi]
- Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk AssessmentLamine Aouad, Muhammad Rizwan Asghar. 580-586 [doi]
- Performance Comparison of Two Generic MPC-frameworks with Symmetric CiphersThomas Lorünser, Florian Wohner. 587-594 [doi]
- A Fine-grained Access Control Model for Knowledge GraphsMarco Valzelli, Andrea Maurino, Matteo Palmonari. 595-601 [doi]
- A Trend-following Trading Indicator on Homomorphically Encrypted DataHaotian Weng, Artem Lenskiy. 602-607 [doi]
- SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacksSana Belguith, Muhammad Rizwan Asghar, Song Wang, Karina Mabell Gomez, Giovanni Russello. 608-617 [doi]
- QSOR: Quantum-safe Onion RoutingZsolt Tujner, Thomas Rooijakkers, Maran van Heesch, Melek Önen. 618-624 [doi]
- Attribute-Based Encryption and Its Application to a Software-Distributed Shared MemoryOana Stan, Loïc Cudennec, Louis Syoën. 625-631 [doi]
- Address-bit Differential Power Analysis on Boolean Split Exponent Counter-measureChristophe Nègre. 632-637 [doi]
- Providing Secured Access Delegation in Identity Management SystemsAbubakar-sadiq Shehu, António Pinto, Manuel Eduardo Correia. 638-644 [doi]
- An Innovative Self-Healing Approach with STIX Data UtilisationArnolnt Spyros, Konstantinos Rantos, Alexandros Papanikolaou, Christos Ilioudis. 645-651 [doi]
- A Comprehensive Quantified Approach for Security Risk Management in e-Health SystemsSondes Ksibi, Faouzi Jaïdi, Adel Bouhoula. 652-657 [doi]