Abstract is missing.
- Attestation: Evidence and TrustGeorge Coker, Joshua D. Guttman, Peter Loscocco, Justin Sheehy, Brian T. Sniffen. 1-18 [doi]
- A Novel Solution for End-to-End Integrity Protection in Signed PGP MailLijun Liao, Jörg Schwenk. 19-32 [doi]
- Unclonable Lightweight Authentication SchemeGhaith Hammouri, Erdinç Öztürk, Berk Birand, Berk Sunar. 33-48 [doi]
- Threat Modelling in User Performed AuthenticationXun Dong, John A. Clark, Jeremy L. Jacob. 49-64 [doi]
- Access with Fast Batch Verifiable Anonymous CredentialsKe Zeng. 65-80 [doi]
- Quantifying Timing Leaks and Cost OptimisationAlessandra Di Pierro, Chris Hankin, Herbert Wiklicky. 81-96 [doi]
- Method for Detecting Vulnerability to Doubling AttacksChong Hee Kim, Jean-Jacques Quisquater. 97-110 [doi]
- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 RequirementsPraveen Gauravaram, Katsuyuki Okeya. 111-127 [doi]
- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-BoxYukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki. 128-140 [doi]
- Analysis of Two Attacks on Reduced-Round Versions of the SMS4Deniz Toz, Orr Dunkelman. 141-156 [doi]
- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle AttackJiali Choy, Khoongming Khoo, Chuan-Wen Loe. 157-173 [doi]
- Beyond User-to-User Access Control for Online Social NetworksMohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn. 174-189 [doi]
- Revocation Schemes for Delegation LicencesMeriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula. 190-205 [doi]
- Reusability of Functionality-Based Application Confinement Policy AbstractionsZ. Cliffe Schreuders, Christian Payne. 206-221 [doi]
- Towards Role Based Trust Management without Distributed Searching of CredentialsGang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi. 222-237 [doi]
- BinHunt: Automatically Finding Semantic Differences in Binary ProgramsDebin Gao, Michael K. Reiter, Dawn Xiaodong Song. 238-255 [doi]
- Enhancing Java ME Security Support with Resource Usage MonitoringAlessandro Castrucci, Fabio Martinelli, Paolo Mori, Francesco Roperti. 256-266 [doi]
- Pseudo-randomness Inside Web BrowsersZhi Guan, Long Zhang, Zhong Chen, Xianghao Nan. 267-278 [doi]
- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal DataHenrich Christopher Pöhls. 279-293 [doi]
- Embedding Renewable Cryptographic Keys into Continuous Noisy DataIleana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis. 294-310 [doi]
- Automated Device Pairing for Asymmetric Pairing ScenariosNitesh Saxena, Md. Borhan Uddin. 311-327 [doi]
- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.Nicolas Courtois, Blandine Debraize. 328-344 [doi]
- Towards an Information Theoretic Analysis of Searchable EncryptionSaeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker. 345-360 [doi]
- A Bootstrap Attack on Digital Watermarks in the Frequency DomainSam Behseta, Charles Lam, Robert L. Webb. 361-375 [doi]
- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing SchemesRabia Sirhindi, Saeed Murtaza, Mehreen Afzal. 376-386 [doi]
- Efficient Multi-authorizer Accredited Symmetrically Private Information RetrievalMohamed Layouni, Maki Yoshida, Shingo Okamura. 387-402 [doi]
- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case StudyMehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohamed Mejri. 403-418 [doi]
- Publicly Verifiable Remote Data IntegrityKe Zeng. 419-434 [doi]