Abstract is missing.
- Model Repositories at the Enterprises and Systems Scale - The Modelio Constellation SolutionPhilippe Desfray.
- Hiding in a Panopticon - Grand Challenges in Internet AnonymityBryan Ford.
- A Posteriori Process Security ControlRafael Accorsi.
- Privacy in Social Networks - Existing Challenges and Proposals for SolutionGünther Pernul.
- A New Science of Security Decision MakingPatrick McDaniel.
- From Passwords to Biometrics - In Pursuit of a PanaceaSteven Furnell.
- Understanding Information Technology Security Standards Diffusion - An Institutional PerspectiveSylvestre Uwizeyemungu, Placide Poba-Nzaou. 5-16 [doi]
- Malfinder: Accelerated Malware Classification System through Filtering on Manycore SystemTaeGyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park, Kyu Ho Park. 17-26 [doi]
- A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF FilesDavide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto. 27-36 [doi]
- Optimizing Cryptographically based Security in Wireless NetworksStuart Jacobs. 39-45
- Evaluation of the Anonymous I2P Network's Design Choices Against Performance and SecurityJuan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor. 46-55 [doi]
- Assessing Information Security Risks of AMI - What Makes it so Difficult?Inger Anne Tøndel, Maria B. Line, Gorm Johansen. 56-63 [doi]
- Analyzing Quality Criteria in Role-based Identity and Access ManagementMichael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul. 64-72 [doi]
- A Novel Model of Security Policies and RequirementsPreetam Mukherjee, Chandan Mazumdar. 73-82 [doi]
- Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual MachineMatrazali Noorafiza, Hiroshi Maeda, Ryuya Uda, Toshiyuki Kinoshita, M. Shiratori. 83-89 [doi]
- Clustering Spam Emails into CampaignsMina Sheikh Alishahi, Mohamed Mejri, Nadia Tawbi. 90-97 [doi]
- On Detection of Bitcoin Mining Redirection AttacksNicolas T. Courtois, Pinar Emirdag, Zhouyixing Wang. 98-105 [doi]
- Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional SecuritySriram Krishnamachari, Mehrdad Nojoumian, Kemal Akkaya. 106-113 [doi]
- Defeating DDoS using Productive PuzzlesMehmud Abliz, Taieb F. Znati. 114-123
- HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and EncryptionJayagopal Narayanaswamy, Raghav V. Sampangi, Srinivas Sampalli. 124-131 [doi]
- Modelling of Enterprise Insider ThreatsPuloma Roy, Chandan Mazumdar. 132-136 [doi]
- ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLCGregor Bonney, Hans Höfken, Benedikt Paffen, Marko Schuba. 137-142 [doi]
- Filtering Unfair Users - A Hidden Markov Model ApproachBushra Anjum, Manish Rajangam, Harry G. Perros, Wenjuan Fan. 147-154
- A Policy-based Communications Architecture for VehiclesVassilis Prevelakis, Mohammad Hamad. 155-162 [doi]
- Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate ResearchAnsgar Koene, Elvira Perez, Christopher James Carter, Ramona Statache, Svenja Adolphs, Claire O'Malley, Tom Rodden, Derek McAuley. 163-168 [doi]
- Model-driven Privacy Assessment in the Smart GridFabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frîncu, Viktor K. Prasanna. 173-181 [doi]
- A Scratch-based Graphical Policy Editor for XACMLHenrik Nergaard, Nils Ulltveit-Moe, Terje Gjøsæter. 182-190 [doi]
- Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information LossAderonke Busayo Sakpere, Anne V. D. M. Kayem. 191-201 [doi]
- Private Web Search with Constant Round EfficiencyBolam Kang, Sung Cheol Goh, Myungsun Kim. 205-212 [doi]
- Expansions of CHAP - Modificationless on Its Structures of Packet and Data ExchangeMasaki Inamura. 213-220 [doi]
- Performance-optimized Indexes for Inequality Searches on Encrypted Data in PracticeJan Lehnhardt, Tobias Rho, Adrian Spalka, Armin B. Cremers. 221-229 [doi]
- Malware Classification Method Based on Sequence of Traffic FlowHyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura. 230-237 [doi]
- Bilinear Pairing-based Hybrid Mixnet with Anonymity RevocationAndrea Huszti, Zita Kovacs. 238-245 [doi]
- Privacy and Security Concern of Online Social Networks from User PerspectiveAl-Amin Hossain, Weining Zhang. 246-253 [doi]
- A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc NetworksCarsten Büttner, Sorin A. Huss. 259-269 [doi]
- Multi-sensor Authentication to Improve Smartphone SecurityWei-Han Lee, Ruby B. Lee. 270-280 [doi]
- On the Power Consumption of Cryptographic Processors in Civil MicrodronesAbdulhadi Shoufan, Hassan Alnoon, Joonsang Baek. 283-290 [doi]
- The Palm Vein Graph - Feature Extraction and MatchingArathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam. 295-303 [doi]
- Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy CommitmentMélanie Favre, Sylvaine Picard, Julien Bringer, Hervé Chabanne. 304-311 [doi]
- Quality Assessment of Fingerprints with Minutiae Delaunay TriangulationZhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger. 315-321 [doi]
- The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait RecognitionJosselyn Le Moing, Ingo Stengel. 322-328 [doi]
- EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints DevicesBenoît Vibert, Zhigang Yao, Sylvain Vernois, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger. 329-335 [doi]
- Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae FeaturesZhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger. 336-343 [doi]