Abstract is missing.
- Transaction Immutability and Reputation Traceability: Blockchain as a Platform for Access Controlled IoT and Human InteractivityDavid W. Kravitz. 3-14 [doi]
- Lelantos: A Blockchain-Based Anonymous Physical Delivery SystemRiham AlTawy, Muhammad ElSheikh, Amr M. Youssef, Guang Gong. 15-24 [doi]
- Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin BlockchainDaniel Augot, Hervé Chabanne, Olivier Clémot, William George. 25-34 [doi]
- A Nonoutsourceable Puzzle Under GHOST RuleGongxian Zeng, Siu-Ming Yiu, Jun Zhang, Hiroki Kuzuno, Man Ho Au. 35-43 [doi]
- An Identity Management System Based on BlockchainYuan Liu 0002, Zheng Zhao, Guibing Guo, Xingwei Wang, Zhenhua Tan, Shuang Wang. 44-56 [doi]
- OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote FrameHyunsung Lee, Seong-Hoon Jeong, Huy Kang Kim. 57-66 [doi]
- A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based NetworksSubhojeet Mukherjee, Jacob Walker, Indrakshi Ray, Jeremy Daily. 67-76 [doi]
- Context Sensitive and Secure Parser Generation for Deep Packet Inspection of Binary ProtocolsAli ElShakankiry, Thomas R. Dean. 77-86 [doi]
- A New Segmentation Method for Integrated ICS (Short Paper)Khaoula Es-Salhi, David Espes, Nora Cuppens. 87-94 [doi]
- SORTaki: A Framework to Integrate Sorting with Differential Private Histogramming AlgorithmsDoudalis Stylianos, Sharad Mehrotra. 95-104 [doi]
- Differentially Private Instance-Based Noise Mechanisms in PracticeSébastien Canard, Baptiste Olivier, Tony Quertier. 105-114 [doi]
- Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive AttributesSeira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka. 115-126 [doi]
- What Your Brain Says About Your Password: Using Brain-Computer Interfaces to Predict Password MemorabilityRuba AlOmari, Miguel Vargas Martin, Shane MacDonald, Christopher Bellman, Ramiro Liscano, Amit Maraj. 127-136 [doi]
- System-Assigned Passwords You Can't Write Down, But Don't Need ToZeinab Joudaki, Julie Thorpe, Miguel Vargas Martin. 137-146 [doi]
- Smartphone Continuous Authentication Using Deep Learning AutoencodersMario Parreño Centeno, Aad van Moorsel, Stefano Castruccio. 147-158 [doi]
- No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016Karthik Sheshadri, Nirav Ajmeri, Jessica Staddon. 159-168 [doi]
- RandHeap: Heap Randomization for Mitigating Heap Spray Attacks in Virtual MachinesAbhinav Jangda, Mohit Mishra. 169-180 [doi]
- Privacy is the Boring Bit: User Perceptions and Behaviour in the Internet-of-ThingsMeredydd Williams, Jason R. C. Nurse, Sadie Creese. 181-190 [doi]
- Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper)Rebecca Cooper, Hala Assal, Sonia Chiasson. 191-196 [doi]
- How Much Privacy Does $3, 165 Buy You?Jeremy Martin, Dane Brown, Kris Merrion, Lamont Brown, Travis Mayberry. 197-204 [doi]
- Privacy-Preserving Multi-Party Bartering Secure Against Active AdversariesStefan Wüller, Ulrike Meyer, Susanne Wetzel. 205-214 [doi]
- A Taxonomy of Secure Two-Party Comparison Protocols and Efficient ConstructionsNuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt. 215-224 [doi]
- Conditionally Secure Multiparty Computation using Secret Sharing Scheme for n < 2k-1 (Short Paper)Ahmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura. 225-232 [doi]
- Towards a Network-Based Framework for Android Malware Detection and CharacterizationArash Habibi Lashkari, Andi Fitriah Abdul Kadir, Hugo Gonzalez, Kenneth Fon Mbah, Ali A. Ghorbani. 233-234 [doi]
- Automated Static Analysis and Classification of Android Malware using Permission and API Calls ModelsAnastasia Skovoroda, Dennis Gamayunov. 243-252 [doi]
- Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper)Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet. 253-258 [doi]
- On Return Oriented Programming Threats in Android RuntimeAkshaya Venkateswara Raja, Jehyun Lee, Debin Gao. 259-267 [doi]
- How Much Privilege Does an App Need? Investigating Resource Usage of Android Apps (Short Paper)Nurul Momen, Tobias Pulls, Lothar Fritsch, Stefan Lindskog. 268-276 [doi]
- Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper)Giulia Traverso, Carlos Garcia Cordero, Mehrdad Nojoumian, Reza Azarderakhsh, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann 0001. 277-282 [doi]
- Running Compression Algorithms in the Encrypted Domain: A Case-Study on the Homomorphic Execution of RLESébastien Canard, Sergiu Carpov, Donald Nokam Kuate, Renaud Sirdey. 283-292 [doi]
- A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud DatabaseMeiqi He, Jun Zhang, Gongxian Zeng, Siu-Ming Yiu. 293-302 [doi]
- Information Leakage Analysis of Inner-Product Functional Encryption Based Data ClassificationDamien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey. 303-310 [doi]
- Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper)Lydia Garms, Keith M. Martin, Siaw-Lynn Ng. 311-316 [doi]
- ABnews: A Fast Private Social Messaging System Using Untrusted Storage and Attribute-Based EncryptionYasushi Shinjo, Sota Naito, Xiao Kunyao, Akira Sato. 317-326 [doi]
- Modeling Exposure in Online Social NetworksAndrew Cortese, Amirreza Masoumzadeh. 327-336 [doi]
- From Tag to Protect: A Tag-Driven Policy Recommender System for Image SharingAnna Cinzia Squicciarini, Andrea Novelli, Dan Lin 0001, Cornelia Caragea, Haoti Zhong. 337-348 [doi]
- Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper)Marc-André Laverdière, Ettore Merlo. 349-354 [doi]
- Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web AttacksApostolis Zarras, Federico Maggi. 355-364 [doi]
- Performance Analysis and Comparison of Different Elliptic Curves on Smart CardsPetr Dzurenda, Sara Ricci, Jan Hajny, Lukas Malina. 365-374 [doi]
- On the Additional Chi-Square Tests for the IID Assumption of NIST SP 800-90BJu-Sung Kang, Hojoong Park, Yongjin Yeom. 375-384 [doi]
- An Analysis of the Security of Compressed Sensing Using an Artificial Neural NetworkShadan Ghaffaripour, Fadi Younis, Hoi Ting Poon, Ali Miri. 385-387 [doi]
- Information-Flow Control with Fading LabelsAndrew Bedford. 388-390 [doi]
- A Certified Core Policy LanguageBahman Sistany, Amy P. Felty. 391-393 [doi]
- Optimized Secure Data Aggregation in Wireless Sensor NetworksScott A. Thompson, Bharath K. Samanthula. 394-396 [doi]
- A Post-Quantum One Time Signature Using Bloom FilterMasoumeh Shafieinejad, Reihaneh Safavi-Naini. 397-399 [doi]
- Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain SystemsThomas P. Keenan. 400-402 [doi]