Abstract is missing.
- Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNsAlessio Di Mauro, Xenofon Fafoutis, Sebastian Mödersheim, Nicola Dragoni. 1-16 [doi]
- Security Games for Cyber-Physical SystemsRoberto Vigo, Alessandro Bruni, Ender Yüksel. 17-32 [doi]
- Prevent Session Hijacking by Binding the Session to the Cryptographic Network CredentialsWillem Burgers, Roel Verdult, Marko C. J. D. van Eekelen. 33-50 [doi]
- Inferring Required Permissions for Statically Composed ProgramsTero Hasu, Anya Helene Bagge, Magne Haveraaen. 51-66 [doi]
- SafeScript: JavaScript Transformation for Policy EnforcementMike Ter Louw, Phu H. Phung, Rohini Krishnamurti, Venkat N. Venkatakrishnan. 67-83 [doi]
- A Logic for Information Flow Analysis of Distributed ProgramsMusard Balliu. 84-99 [doi]
- Dynamics and Secure Information Flow for a Higher-Order Pi-CalculusMartin Pettai, Peeter Laud. 100-115 [doi]
- Lazy Programs Leak SecretsPablo Buiras, Alejandro Russo. 116-122 [doi]
- High-Performance Qualified Digital Signatures for X-RoadArne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson. 123-138 [doi]
- Identification and Evaluation of Security Activities in Agile ProjectsTigist Ayalew, Tigist Kidane, Bengt Carlsson. 139-153 [doi]
- PeerShare: A System Secure Distribution of Sensitive Data among Social ContactsMarcin Nagy, N. Asokan, Jörg Ott. 154-165 [doi]
- Resilience of Process Control Systems to Cyber-Physical AttacksMarina Krotofil, Alvaro A. Cárdenas. 166-182 [doi]
- Femtocell Security in Theory and PracticeFabian van den Broek, Ronny Wichers Schreur. 183-198 [doi]
- Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation TechniquesAlessio Antonini, Alessandro Barenghi, Gerardo Pelosi. 199-214 [doi]
- Controlling Data Flow with a Policy-Based Programming Language for the WebThierry Sans, Iliano Cervesato, Soha Hussein. 215-230 [doi]
- A Survey on Control-Flow Integrity Means in Web Application FrameworksBastian Braun, Christian v. Pollak, Joachim Posegga. 231-246 [doi]
- Incremental Hyperproperty Model Checking via GamesDimiter Milushev, Dave Clarke. 247-262 [doi]
- Graph k-Anonymity through k-Means and as Modular DecompositionKlara Stokes. 263-278 [doi]
- Domain-Based Storage Protection (DBSP) in Public Infrastructure CloudsNicolae Paladi, Christian Gehrmann, Fredric Morenius. 279-296 [doi]
- An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS PoliciesNabil Hachem, Joaquín García-Alfaro, Hervé Debar. 297-312 [doi]
- Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-TreesAhto Buldas, Andres Kroonmaa, Risto Laanoja. 313-320 [doi]