Abstract is missing.
- Relay Attacks on Secure Element-Enabled Mobile Devices - Virtual Pickpocketing RevisitedMichael Roland, Josef Langer, Josef Scharinger. 1-12 [doi]
- Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures)Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame. 13-24 [doi]
- An Approach to Detecting Inter-Session Data Flow Induced by Object PoolingBernhard J. Berger, Karsten Sohr. 25-36 [doi]
- Embedded Eavesdropping on Java CardGuillaume Barbu, Christophe Giraud, Vincent Guerin. 37-48 [doi]
- Authenticated Key Exchange (AKE) in Delay Tolerant NetworksSofia-Anna Menesidou, Vasilios Katos. 49-60 [doi]
- OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity ManagementAlexandre B. Augusto, Manuel Eduardo Correia. 61-74 [doi]
- Smart OpenID: A Smart Card Based OpenID ProtocolAndreas Leicher, Andreas U. Schmidt, Yogendra Shah. 75-86 [doi]
- Peer to Peer Botnet Detection Based on Flow IntervalsDavid Zhao, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu. 87-102 [doi]
- Towards a Universal Data Provenance Framework Using Dynamic InstrumentationEleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis. 103-114 [doi]
- Improving Flask Implementation Using Hardware Assisted In-VM IsolationBaozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He. 115-125 [doi]
- HyperForce: Hypervisor-enForced Execution of Security-Critical CodeFrancesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen. 126-137 [doi]
- RandHyp: Preventing Attacks via Xen Hypercall InterfaceFeifei Wang, Ping Chen, Bing Mao, Li Xie. 138-149 [doi]
- Role Mining under Role-Usage Cardinality ConstraintJohn C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. 150-161 [doi]
- HIDE_DHCP: Covert Communications through Network Configuration MessagesRuben Rios, Jose Antonio Onieva, Javier Lopez. 162-173 [doi]
- Handling Stateful Firewall AnomaliesFrédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Tarik Moataz, Xavier Rimasson. 174-186 [doi]
- A Framework for Threat Assessment in Access Control SystemsHemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo. 187-198 [doi]
- Support for Write Privileges on Outsourced DataSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 199-210 [doi]
- Malicious Users' Transactions: Tackling Insider ThreatWeihan Li, Brajendra Panda, Qussai Yaseen. 211-222 [doi]
- Privacy-Preserving Television Audience Measurement Using Smart TVsGeorge Drosatos, Aimilia Tasidou, Pavlos S. Efraimidis. 223-234 [doi]
- Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical FeasibilityChristian Banse, Dominik Herrmann, Hannes Federrath. 235-248 [doi]
- Smartphone Forensics: A Proactive Investigation Scheme for Evidence AcquisitionAlexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis. 249-260 [doi]
- Modeling Social Engineering Botnet Dynamics across Multiple Social NetworksShuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang 0002, Xiang Cui, Yipeng Wang. 261-272 [doi]
- Layered Analysis of Security CeremoniesGiampaolo Bella, Lizzie Coles-Kemp. 273-286 [doi]
- A Small Depth-16 Circuit for the AES S-BoxJoan Boyar, René Peralta. 287-298 [doi]
- Formal Verification of the mERA-Based eServices with Trusted Third Party ProtocolMaria Christofi, Aline Gouget. 299-314 [doi]
- My Authentication Album: Adaptive Images-Based Login MechanismAmir Herzberg, Ronen Margulies. 315-326 [doi]
- Balancing Security and Usability of Local Security Mechanisms for Mobile DevicesShuzhe Yang, Gökhan Bal. 327-338 [doi]
- Analyzing Value Conflicts for a Work-Friendly ISS Policy ImplementationElla Kolkowska, Bart De Decker. 339-351 [doi]
- When Convenience Trumps Security: Defining Objectives for Security and Usability of SystemsGurpreet Dhillon, Tiago Oliveira, Santa R. Susarapu, Mário M. Caldeira. 352-363 [doi]
- Security-by-Contract for the OSGi PlatformOlga Gadyatskaya, Fabio Massacci, Anton Philippov. 364-375 [doi]
- Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness AnalysisHyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In. 376-387 [doi]
- Incentive Compatible Moving Target Defense against VM-Colocation Attacks in CloudsYulong Zhang, Min Li, Kun Bai, Meng Yu, Wanyu Zang. 388-399 [doi]
- Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation FrameworkHan Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu. 400-411 [doi]
- A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante RegulationGiuseppe D'Acquisto, Marta Flamini, Maurizio Naldi. 412-423 [doi]
- Optimizing Network Patching Policy DecisionsYolanta Beres, Jonathan Griffin. 424-442 [doi]
- A Risk Assessment Method for SmartphonesMarianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis. 443-456 [doi]
- Empirical Benefits of Training to Phishing SusceptibilityRonald Dodge, Kathryn Coronges, Ericka Rovira. 457-464 [doi]
- Multi-modal Behavioural Biometric Authentication for Mobile DevicesHataichanok Saevanee, Nathan L. Clarke, Steven M. Furnell. 465-474 [doi]
- Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated NetworksChristoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis. 475-488 [doi]
- Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary AttacksYongge Wang. 489-500 [doi]
- Distributed Path Authentication for Dynamic RFID-Enabled Supply ChainsShaoying Cai, Yingjiu Li, Yunlei Zhao. 501-512 [doi]
- Enhanced Dictionary Based Rainbow TableVrizlynn L. L. Thing, Hwei-Ming Ying. 513-524 [doi]
- Authorization Policies for Materialized ViewsSarah Nait Bahloul, Emmanuel Coquery, Mohand-Said Hacid. 525-530 [doi]
- Enhancing the Security of On-line Transactions with CAPTCHA KeyboardYongdong Wu, Zhigang Zhao. 531-536 [doi]
- Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management ApproachXin Kang, Yongdong Wu. 537-542 [doi]
- A Framework for Anonymizing GSM Calls over a Smartphone VoIP NetworkIoannis Psaroudakis, Vasilios Katos, Pavlos S. Efraimidis. 543-548 [doi]
- A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web PagesMarco Prandini, Marco Ramilli. 549-554 [doi]
- Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth SystemMilica Milutinovic, Vincent Naessens, Bart De Decker. 555-560 [doi]
- Web Services Security Assessment: An Authentication-Focused ApproachYannis Soupionis, Miltiadis Kandias. 561-566 [doi]
- Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National CaseNineta Polemi, Theodoros Ntouskas. 567-572 [doi]
- A Response Strategy Model for Intrusion Response SystemsNor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke. 573-578 [doi]
- Intrusion Tolerance of Stealth DoS Attacks to Web ServicesMassimo Ficco, Massimiliano Rak. 579-584 [doi]
- Towards Use-Based Usage ControlChristos Grompanopoulos, Ioannis Mavridis. 585-590 [doi]