Abstract is missing.
- Welcome message from the general chairAli Miri. 1 [doi]
- Can apps play by the COPPA Rules?Ilaria Liccardi, Monica Bulger, Harold Abelson, Daniel J. Weitzner, Wendy E. Mackay. 1-9 [doi]
- Privacy-preserving mobility-casting in opportunistic networksGianpiero Costantino, Fabio Martinelli, Paolo Santi. 10-18 [doi]
- Undetectable communication: The Online Social Networks caseFilipe Beato, Emiliano De Cristofaro, Kasper Bonne Rasmussen. 19-26 [doi]
- Building privacy-preserving location-based appsBrian Sweatt, Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, Alex Pentlandz. 27-30 [doi]
- "You are what you play": Breaching privacy and identifying users in online gamingDragana Martinovic, Victor Ralevich, Joshua McDougall, Michael Perklin. 31-39 [doi]
- Inferring social relationships from technology-level device connectionsJason R. C. Nurse, Jess Pumphrey, Thomas Gibson-Robinson, Michael Goldsmith, Sadie Creese. 40-47 [doi]
- MindYourPrivacy: Design and implementation of a visualization system for third-party Web trackingYuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, Tomoya Inoue. 48-56 [doi]
- A secure two-party bartering protocol using privacy-preserving interval operationsFabian Forg, Daniel A. Mayer, Susanne Wetzel, Stefan Wuller, Ulrike Meyer. 57-66 [doi]
- Direct Anonymous Attestation in practice: Implementation and efficient revocationLi Xi, Dengguo Feng, Yu Qin, Feng Wei, Jianxiong Shao, Bo Yang. 67-74 [doi]
- Using biometric key commitments to prevent unauthorized lending of cryptographic credentialsDavid Bissessar, Carlisle Adams, Dong Liu. 75-83 [doi]
- Mining YouTube metadata for detecting privacy invading harassment and misdemeanor videosNisha Aggarwal, Swati Agarwal 0001, Ashish Sureka. 84-93 [doi]
- Who Uses Bitcoin? An exploration of the Bitcoin communityJeremiah Bohr, Masooda Bashir. 94-101 [doi]
- Desperately seeking assurances: Segmenting users by their information-seeking preferencesAnthony Morton, Martina Angela Sasse. 102-111 [doi]
- Private intersection of regular languagesRoberto Guanciale, Dilian Gurov, Peeter Laud. 112-120 [doi]
- Enabling privacy through transparencyOshani Seneviratne, Lalana Kagal. 121-128 [doi]
- Privacy-respecting digital investigationAli Dehghantanha, Katrin Franke. 129-138 [doi]
- ZARATHUSTRA: Extracting Webinject signatures from banking trojansClaudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico Maggi. 139-148 [doi]
- Quantifying the financial impact of it security breaches on business processesClemens Martin, Amina Kadry, Ghada Abu-Shady. 149-155 [doi]
- Semi-synthetic data set generation for security software evaluationFlorian Skopik, Giuseppe Settanni, Roman Fiedler, Ivo Friedberg. 156-163 [doi]
- Towards efficient evaluation of XACML policiesAzzam Mourad, Hussein Jebbaoui. 164-171 [doi]
- A forensic analysis framework for recovering encryption keys and BB10 backup decryptionHalima Al Shehhi, Dua'a Abu Hamdi, IzzEddin Asad, Farkhund Iqbal. 172-178 [doi]
- Continuous authentication using micro-messagesMarcelo Luiz Brocardo, Issa Traoré. 179-188 [doi]
- Improving usability of passphrase authenticationGlen Nielsen, Michael Vedel, Christian D. Jensen. 189-198 [doi]
- Secure VANET applications with a refined group signatureMohammad Saiful Islam Mamun, Atsuko Miyaji. 199-206 [doi]
- A study of mnemonic image passwordsSoumyadeb Chowdhury, Ron Poet, Lewis Mackenzie. 207-214 [doi]
- Data-centric phishing detection based on transparent virtualization technologiesSebastian Biedermann, Tobias Ruppenthal, Stefan Katzenbeisser. 215-223 [doi]
- Clickjuggler: Checking for incomplete defenses against clickjackingYusuke Takamatsu, Kenji Kono. 224-231 [doi]
- Identifying users with application-specific command streamsAla'a El Masri, Harry Wechsler, Peter Likarish, Brent ByungHoon Kang. 232-238 [doi]
- Granularity based flow controlOmar Abahmane, Luigi Logrippo. 239-248 [doi]
- Automated generation of models for fast and precise detection of HTTP-based malwareApostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, Thorsten Holz. 249-256 [doi]
- P-SPADE: GPU accelerated malware packer detectionNeha Gupta, Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Muttukrishnan Rajarajan. 257-263 [doi]
- Detection and mitigation of malicious JavaScript using information flow controlBassam Sayed, Issa Traoré, Amany Abdelhalim. 264-273 [doi]
- Secure exams despite malicious managementGiampaolo Bella, Rosario Giustolisi, Gabriele Lenzini. 274-281 [doi]
- Another free app: Does it have the right intentions?Mohamed Fazeen, Ram Dantu. 282-289 [doi]
- Specifying and enforcing constraints in dynamic access control policiesNada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam. 290-297 [doi]
- Design requirements to counter parallel session attacks in security protocolsAnca D. Jurcut, Tom Coffey, Reiner Dojen. 298-305 [doi]
- Automata-based approach to design and analyze security policiesWadie Krombi, Mohammed Erradi, Ahmed Khoumsi. 306-313 [doi]
- Efficient verification of data encryption on cloud serversKeji Hu, Wensheng Zhang. 314-321 [doi]
- Assessing cryptographic signature schemes from a legal perspectiveDan T. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu. 322-329 [doi]
- Distributed Searchable Symmetric EncryptionChristoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel, Willem Jonker. 330-337 [doi]
- Generalization of socio-rational secret sharing with a new utility functionMehrdad Nojoumian. 338-341 [doi]
- Crypto-assistant: Towards facilitating developer's encryption of sensitive dataRicardo Rodriguez Garcia, Julie Thorpe, Miguel Vargas Martin. 342-346 [doi]
- A trust based Information sharing model (TRUISM) in MANET in the presence of uncertaintyKhalid Zaman Bijon, Md Munirul Haque, Ragib Hasan. 347-354 [doi]
- Validating trust models against realworld data setsNoel Sardana, Robin Cohen. 355-362 [doi]
- Demonstrating the value of credibility modeling for trust-based approaches to online message recommendationNoel Sardana, Robin Cohen. 363-370 [doi]
- TRAAC: Trust and risk aware access controlChris Burnett, Liang Chen, Peter Edwards, Timothy J. Norman. 371-378 [doi]
- A typed natural deduction calculus to reason about secure trustGiuseppe Primiero, Franco Raimondi. 379-382 [doi]
- Two trust networks in one: Using bipolar structures to fuse trust and distrustStefano Bistarelli, Francesco Santini. 383-390 [doi]
- Communicating and visualising multicriterial trustworthiness under uncertaintyFlorian Volk, Sascha Hauke, Daniel Dieth, Max Mühlhäuser. 391-397 [doi]
- What can the hashtag #trust tell us about how users conceptualise trust?Natasha Dwyer, Stephen Marsh. 398-402 [doi]
- Analyzing trustworthiness of virtual machines in data-intensive cloud computingDipen Contractor, Dhiren R. Patel. 403-406 [doi]
- i/k-Contact: A context-aware user authentication using physical social trustShiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki, Akira Shiba. 407-413 [doi]
- Weighting peer reviewersArnaldo Spalvieri, Silvio Mandelli, Maurizio Magarini, Giuseppe Bianchi. 414-419 [doi]
- TrustCV: Reputation-based trust for collectivist digital business ecosystemsDonovan Isherwood, Marijke Coetzee. 420-424 [doi]