Abstract is missing.
- Privacy-Preserving Distributed Economic Dispatch Protocol for Smart GridAvikarsha Mandal, Frederik Armknecht, Erik Zenner. 3-18 [doi]
- Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing AppsIulia Bastys, Frank Piessens, Andrei Sabelfeld. 19-37 [doi]
- MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix ZonesMirja Nitschke, Philipp Holler, Lukas Hartmann, Dogan Kesdogan. 38-53 [doi]
- AppLance: A Lightweight Approach to Detect Privacy Leak for Packed ApplicationsHongliang Liang, Yudong Wang, Tianqi Yang, Yue Yu. 54-70 [doi]
- Unifying Kleptographic AttacksGeorge Teseleanu. 73-87 [doi]
- Steady - A Simple End-to-End Secure Logging SystemTobias Pulls, Rasmus Dahlberg. 88-103 [doi]
- Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement DistillationArash Atashpendar, G. Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan. 104-120 [doi]
- On Security Analysis of Generic Dynamic Authenticated Group Key ExchangeZheng Yang 0001, Mohsin Khan, Wanping Liu, Jun He. 121-137 [doi]
- A Blockchain-Assisted Hash-Based Signature SchemeAhto Buldas, Risto Laanoja, Ahto Truu. 138-153 [doi]
- The Fiat-Shamir Zoo: Relating the Security of Different Signature VariantsMatilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun. 154-170 [doi]
- Verifiable Light-Weight Monitoring for Certificate Transparency LogsRasmus Dahlberg, Tobias Pulls. 171-183 [doi]
- CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUsCharalampos Stylianopoulos, Linus Johansson, Oskar Olsson, Magnus Almgren. 187-202 [doi]
- Detection of Covert Channels in TCP RetransmissionsSebastian Zillien, Steffen Wendzel. 203-218 [doi]
- What You Can Change and What You Can't: Human Experience in Computer Network DefensesVivien M. Rooney, Simon N. Foley. 219-235 [doi]
- Attack Simulation for a Realistic Evaluation and Comparison of Network Security TechniquesAlexander Bajic, Georg T. Becker. 236-254 [doi]
- Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine IntrospectionStewart Sentanoe, Benjamin Taubmann, Hans P. Reiser. 255-271 [doi]
- Authorization Policies Specification and Consistency Management within Multi-cloud EnvironmentsEhtesham Zahoor, Asim Ikram, Sabina Akhtar, Olivier Perrin 0001. 272-288 [doi]
- Cyber Hygiene: The Big PictureKaie Maennel, Sten Mäses, Olaf Maennel. 291-305 [doi]
- Estimating the Risk of Fraud Against E-ServicesAhmed Seid Yesuf, Christian W. Probst. 306-322 [doi]
- PESTEL Analysis of Hacktivism Campaign MotivationsJuha Nurmi, Mikko S. Niemelä. 323-335 [doi]
- Data Modelling for Predicting ExploitsAlexander Reinthal, Eleftherios Lef Filippakis, Magnus Almgren. 336-351 [doi]
- UpDroid: Updated Android Malware and Its Familial ClassificationKursat Aktas, Sevil Sen. 352-368 [doi]
- Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity FrameworkBarbara Krumay, Edward W. N. Bernroider, Roman Walser. 369-384 [doi]
- Next Generation Cryptographic RansomwareZiya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan. 385-401 [doi]
- Hardware-Assisted Program Execution Integrity: HAPEIRonan Lashermes, Hélène Le Bouder, Gaël Thomas 0002. 405-420 [doi]
- Protecting Instruction Set Randomization from Code Reuse AttacksRoberto Guanciale. 421-436 [doi]
- A Uniform Information-Flow Security Benchmark Suite for Source Code and BytecodeTobias Hamann, Mihai Herda, Heiko Mantel, Martin Mohr, David Schneider 0002, Markus Tasch. 437-453 [doi]
- When Harry Met Tinder: Security Analysis of Dating Apps on AndroidKuyju Kim, Taeyun Kim, Seungjin Lee, Soolin Kim, Hyoungshick Kim. 454-467 [doi]
- Threat Poker: Solving Security and Privacy Threats in Agile Software DevelopmentHanne Rygge, Audun Jøsang. 468-483 [doi]