Abstract is missing.
- Relay Attacks on Secure Element-Enabled Mobile Devices - Virtual Pickpocketing RevisitedMichael Roland, Josef Langer, Josef Scharinger. 1-12  [doi]
- Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures)Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame. 13-24  [doi]
- An Approach to Detecting Inter-Session Data Flow Induced by Object PoolingBernhard J. Berger, Karsten Sohr. 25-36  [doi]
- Embedded Eavesdropping on Java CardGuillaume Barbu, Christophe Giraud, Vincent Guerin. 37-48  [doi]
- Authenticated Key Exchange (AKE) in Delay Tolerant NetworksSofia-Anna Menesidou, Vasilios Katos. 49-60  [doi]
- OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity ManagementAlexandre B. Augusto, Manuel Eduardo Correia. 61-74  [doi]
- Smart OpenID: A Smart Card Based OpenID ProtocolAndreas Leicher, Andreas U. Schmidt, Yogendra Shah. 75-86  [doi]
- Peer to Peer Botnet Detection Based on Flow IntervalsDavid Zhao, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu. 87-102  [doi]
- Towards a Universal Data Provenance Framework Using Dynamic InstrumentationEleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis. 103-114  [doi]
- Improving Flask Implementation Using Hardware Assisted In-VM IsolationBaozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He. 115-125  [doi]
- HyperForce: Hypervisor-enForced Execution of Security-Critical CodeFrancesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg, Wouter Joosen. 126-137  [doi]
- RandHyp: Preventing Attacks via Xen Hypercall InterfaceFeifei Wang, Ping Chen, Bing Mao, Li Xie. 138-149  [doi]
- Role Mining under Role-Usage Cardinality ConstraintJohn C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. 150-161  [doi]
- HIDE_DHCP: Covert Communications through Network Configuration MessagesRuben Rios, Jose Antonio Onieva, Javier Lopez. 162-173  [doi]
- Handling Stateful Firewall AnomaliesFrédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Tarik Moataz, Xavier Rimasson. 174-186  [doi]
- A Framework for Threat Assessment in Access Control SystemsHemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo. 187-198  [doi]
- Support for Write Privileges on Outsourced DataSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 199-210  [doi]
- Malicious Users' Transactions: Tackling Insider ThreatWeihan Li, Brajendra Panda, Qussai Yaseen. 211-222  [doi]
- Privacy-Preserving Television Audience Measurement Using Smart TVsGeorge Drosatos, Aimilia Tasidou, Pavlos S. Efraimidis. 223-234  [doi]
- Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical FeasibilityChristian Banse, Dominik Herrmann, Hannes Federrath. 235-248  [doi]
- Smartphone Forensics: A Proactive Investigation Scheme for Evidence AcquisitionAlexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis. 249-260  [doi]
- Modeling Social Engineering Botnet Dynamics across Multiple Social NetworksShuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang 0002, Xiang Cui, Yipeng Wang. 261-272  [doi]
- Layered Analysis of Security CeremoniesGiampaolo Bella, Lizzie Coles-Kemp. 273-286  [doi]
- A Small Depth-16 Circuit for the AES S-BoxJoan Boyar, René Peralta. 287-298  [doi]
- Formal Verification of the mERA-Based eServices with Trusted Third Party ProtocolMaria Christofi, Aline Gouget. 299-314  [doi]
- My Authentication Album: Adaptive Images-Based Login MechanismAmir Herzberg, Ronen Margulies. 315-326  [doi]
- Balancing Security and Usability of Local Security Mechanisms for Mobile DevicesShuzhe Yang, Gökhan Bal. 327-338  [doi]
- Analyzing Value Conflicts for a Work-Friendly ISS Policy ImplementationElla Kolkowska, Bart De Decker. 339-351  [doi]
- When Convenience Trumps Security: Defining Objectives for Security and Usability of SystemsGurpreet Dhillon, Tiago Oliveira, Santa R. Susarapu, Mário M. Caldeira. 352-363  [doi]
- Security-by-Contract for the OSGi PlatformOlga Gadyatskaya, Fabio Massacci, Anton Philippov. 364-375  [doi]
- Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness AnalysisHyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In. 376-387  [doi]
- Incentive Compatible Moving Target Defense against VM-Colocation Attacks in CloudsYulong Zhang, Min Li, Kun Bai, Meng Yu, Wanyu Zang. 388-399  [doi]
- Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation FrameworkHan Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu. 400-411  [doi]
- A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante RegulationGiuseppe D'Acquisto, Marta Flamini, Maurizio Naldi. 412-423  [doi]
- Optimizing Network Patching Policy DecisionsYolanta Beres, Jonathan Griffin. 424-442  [doi]
- A Risk Assessment Method for SmartphonesMarianthi Theoharidou, Alexios Mylonas, Dimitris Gritzalis. 443-456  [doi]
- Empirical Benefits of Training to Phishing SusceptibilityRonald Dodge, Kathryn Coronges, Ericka Rovira. 457-464  [doi]
- Multi-modal Behavioural Biometric Authentication for Mobile DevicesHataichanok Saevanee, Nathan L. Clarke, Steven M. Furnell. 465-474  [doi]
- Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated NetworksChristoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis. 475-488  [doi]
- Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary AttacksYongge Wang. 489-500  [doi]
- Distributed Path Authentication for Dynamic RFID-Enabled Supply ChainsShaoying Cai, Yingjiu Li, Yunlei Zhao. 501-512  [doi]
- Enhanced Dictionary Based Rainbow TableVrizlynn L. L. Thing, Hwei-Ming Ying. 513-524  [doi]
- Authorization Policies for Materialized ViewsSarah Nait Bahloul, Emmanuel Coquery, Mohand-Said Hacid. 525-530  [doi]
- Enhancing the Security of On-line Transactions with CAPTCHA KeyboardYongdong Wu, Zhigang Zhao. 531-536  [doi]
- Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management ApproachXin Kang, Yongdong Wu. 537-542  [doi]
- A Framework for Anonymizing GSM Calls over a Smartphone VoIP NetworkIoannis Psaroudakis, Vasilios Katos, Pavlos S. Efraimidis. 543-548  [doi]
- A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web PagesMarco Prandini, Marco Ramilli. 549-554  [doi]
- Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth SystemMilica Milutinovic, Vincent Naessens, Bart De Decker. 555-560  [doi]
- Web Services Security Assessment: An Authentication-Focused ApproachYannis Soupionis, Miltiadis Kandias. 561-566  [doi]
- Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National CaseNineta Polemi, Theodoros Ntouskas. 567-572  [doi]
- A Response Strategy Model for Intrusion Response SystemsNor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke. 573-578  [doi]
- Intrusion Tolerance of Stealth DoS Attacks to Web ServicesMassimo Ficco, Massimiliano Rak. 579-584  [doi]
- Towards Use-Based Usage ControlChristos Grompanopoulos, Ioannis Mavridis. 585-590  [doi]