Abstract is missing.
- Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C BlacklistsNizar Kheir, Frédéric Tran, Pierre Caron, Nicolas Deschamps. 1-14 [doi]
- Game Theory Meets Information Security ManagementAndrew Fielder, Emmanouil Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi. 15-29 [doi]
- Model-Based Detection of CSRFMarco Rocchetto, Martín Ochoa, Mohammad Torabi Dashti. 30-43 [doi]
- Lightweight Resource Management for DDoS Traffic Isolation in a Cloud EnvironmentIbnu Mubarok, Kiryong Lee, Sihyung Lee, Heejo Lee. 44-51 [doi]
- Multi-keyword Similarity Search over Encrypted Cloud DataMikhail Strizhov, Indrajit Ray. 52-65 [doi]
- Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor NetworksMee-Loong Yang, Adnan Al-Anbuky, William Liu. 66-79 [doi]
- New Algorithmic Approaches to Point Constellation RecognitionThomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard. 80-90 [doi]
- Protection Profile for PUF-Based DevicesAndrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann. 91-98 [doi]
- Text-Based Active Authentication for Mobile DevicesHataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione. 99-112 [doi]
- Styx: Design and Evaluation of a New Privacy Risk Communication Method for SmartphonesGökhan Bal, Kai Rannenberg, Jason Hong. 113-126 [doi]
- A Trusted UI for the Mobile WebBastian Braun, Johannes Köstler, Joachim Posegga, Martin Johns. 127-141 [doi]
- Detecting Code Reuse in Android Applications Using Component-Based Control Flow GraphXin Sun, Yibing Zhongyang, Zhi-Xin, Bing Mao, Li Xie. 142-155 [doi]
- Privacy Risks from Public Data SourcesZacharias Tzermias, Vassilis Prevelakis, Sotiris Ioannidis. 156-168 [doi]
- Security and Privacy in Video Surveillance: Requirements and ChallengesQasim Mahmood Rajpoot, Christian Damsgaard Jensen. 169-184 [doi]
- Playing Hide and Seek with Mobile Dating ApplicationsGuojun Qin, Constantinos Patsakis, Mélanie Bouroche. 185-196 [doi]
- Towards a Framework for Benchmarking Privacy-ABC TechnologiesFatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri. 197-204 [doi]
- Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web SurfingDominik Herrmann, Max Maaß, Hannes Federrath. 205-219 [doi]
- A Novel Metric for the Evaluation of IDSs EffectivenessKhalid Nasr, Anas Abou El Kalam. 220-233 [doi]
- How to Assess Confidentiality Requirements of Corporate Assets?Gabriela Varona Cervantes, Stefan Fenz. 234-241 [doi]
- Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist AttacksSuhaila Ismail, Elena Sitnikova, Jill Slay. 242-249 [doi]
- Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKSThomas Bauereiss, Dieter Hutter. 250-263 [doi]
- Ghostrail: Ad Hoc Control-Flow Integrity for Web ApplicationsBastian Braun, Caspar Gries, Benedikt Petschkuhn, Joachim Posegga. 264-277 [doi]
- An Information Flow Monitor-Inlining Compiler for Securing a Core of JavaScriptJosé Fragoso Santos, Tamara Rezk. 278-292 [doi]
- Authenticated Dictionary Based on FrequencyKevin Atighehchi, Alexis Bonnecaze, Traian Muntean. 293-306 [doi]
- Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization InfrastructuresDaniela Pöhn, Stefan Metzger, Wolfgang Hommel. 307-320 [doi]
- Efficient Identity-Based Signature from LatticesMiaomiao Tian, Liusheng Huang. 321-329 [doi]
- Context-Aware Multifactor Authentication Based on Dynamic PinYair Diaz-Tellez, Eliane L. Bodanese, Theo Dimitrakos, Michael Turner. 330-338 [doi]
- Authorship Attribution for Forensic Investigation with Thousands of AuthorsMin Yang, Kam-Pui Chow. 339-350 [doi]
- Detection and Labeling of Personal Identifiable Information in E-mailsChristoph Bier, Jonas Prior. 351-358 [doi]
- A Preliminary Study on User's Decision Making towards Retweet MessagesNor Athiyah Abdullah, Dai Nishioka, Yuko Tanaka, Yuko Murayama. 359-365 [doi]
- Behavior Analysis of Web Service AttacksAbdallah Ghourabi, Tarek Abbes, Adel Bouhoula. 366-379 [doi]
- BankSealer: An Online Banking Fraud Analysis and Decision Support SystemMichele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero. 380-394 [doi]
- Security Assessment of Payment Systems under PCI DSS IncompatibilitiesSerif Bahtiyar, Gürkan Gür, Levent Altay. 395-402 [doi]
- PriMan: Facilitating the Development of Secure and Privacy-Preserving ApplicationsAndreas Put, Italo Dacosta, Milica Milutinovic, Bart De Decker. 403-416 [doi]
- Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual ValuesLena Connolly, Michael Lang, J. Doug Tygar. 417-430 [doi]
- Organizational Transformation and Information Security Culture: A Telecom Case StudyGurpreet Dhillon, Romilla Chowdhuri, Cristiane Pedron. 431-437 [doi]
- A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System ModelTheodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda. 438-445 [doi]
- Privacy Design Strategies - (Extended Abstract)Jaap-Henk Hoepman. 446-459 [doi]
- Distance Computation between Two Private Preference FunctionsAlberto Blanco-Justicia, Josep Domingo-Ferrer, Oriol Farràs, David Sánchez 0001. 460-470 [doi]
- Privacy-Preserving Implicit AuthenticationNashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti. 471-484 [doi]
- Trusted Computing to Increase Security and Privacy in eID AuthenticationJan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens. 485-492 [doi]