Abstract is missing.
- O-PSI: Delegated Private Set Intersection on Outsourced DatasetsAydin Abadi, Sotirios Terzis, Changyu Dong. 3-17 [doi]
- Flexible and Robust Privacy-Preserving Implicit AuthenticationJosep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia. 18-34 [doi]
- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure AttackDang Vinh Pham, Dogan Kesdogan. 35-50 [doi]
- POSN: A Personal Online Social NetworkEsra Erdin, Eric Klukovich, Gurhan Gunduz, Mehmet Hadi Gunes. 51-66 [doi]
- Strategic NoninterferenceWojciech Jamroga, Masoud Tabatabaei. 67-81 [doi]
- Verifying Observational DeterminismJaber Karimpour, Ayaz Isazadeh, Ali A. Noroozi. 82-93 [doi]
- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network SniffingChetan Bansal, Sören Preibusch, Natasa Milic-Frayling. 97-111 [doi]
- Enforcing Usage Constraints on Credentials for Web ApplicationsJinwei Hu, Heiko Mantel, Sebastian Ruhleder. 112-125 [doi]
- A Survey of Alerting Websites: Risks and SolutionsAmrit Kumar, Cédric Lauradoux. 126-141 [doi]
- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at ClaimantAsahiko Yamada. 145-158 [doi]
- Enhancing Passwords Security Using Deceptive Covert CommunicationMohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford. 159-173 [doi]
- Information Sharing and User Privacy in the Third-Party Identity Management LandscapeAnna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri. 174-188 [doi]
- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating SystemsMohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic, Sanjay Jha. 189-203 [doi]
- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access ControlTimothy J. Carbino, Michael A. Temple, Juan Lopez Jr.. 204-217 [doi]
- Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information SystemsSalvador Martínez Perez, Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot. 218-233 [doi]
- Authenticated File Broadcast ProtocolSimão Reis, André Zúquete, Carlos Faneca, José M. N. Vieira. 237-251 [doi]
- Automated Classification of C&C Connections Through Malware URL ClusteringNizar Kheir, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro, Dingqi Yang. 252-266 [doi]
- B.Hive: A Zero Configuration Forms Honeypot for Productive Web ApplicationsChristoph Pohl, Alf Zugenmaier, Michael Meier, Hans-Joachim Hof. 267-280 [doi]
- Investigation of Employee Security Behaviour: A Grounded Theory ApproachLena Connolly, Michael Lang, J. Doug Tygar. 283-296 [doi]
- Practice-Based Discourse Analysis of InfoSec PoliciesFredrik Karlsson, Göran Goldkuhl, Karin Hedström. 297-310 [doi]
- Understanding Collaborative Challenges in IT Security Preparedness ExercisesMaria B. Line, Nils Brede Moe. 311-324 [doi]
- Social Groupings and Information Security Obedience Within OrganizationsTeodor Sommestad. 325-338 [doi]
- Attack Trees with Sequential ConjunctionRavi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Rolando Trujillo-Rasua. 339-353 [doi]
- Enhancing the Security of Image CAPTCHAs Through Noise AdditionDavid Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri. 354-368 [doi]
- SHRIFT System-Wide HybRid Information Flow TrackingEnrico Lovat, Alexander Fromm, Martin Mohr, Alexander Pretschner. 371-385 [doi]
- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted LibrariesLiang Deng, Qingkai Zeng, Yao Liu. 386-400 [doi]
- Exploit Generation for Information Flow Leaks in Object-Oriented ProgramsQuoc Huy Do, Richard Bubel, Reiner Hähnle. 401-415 [doi]
- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage InferenceJiang Ming, Dongpeng Xu, Dinghao Wu. 416-430 [doi]
- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware ApproachZhijiao Zhang, Yashuai Lü, Yu Chen, Yongqiang Lu, Yuanchun Shi. 431-445 [doi]
- Integrity for Approximate Joins on Untrusted Computational ServersSabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati. 446-459 [doi]
- Fast Revocation of Attribute-Based Credentials for Both Users and VerifiersWouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers. 463-478 [doi]
- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server EnvironmentToan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong, Isao Echizen. 479-494 [doi]
- A Secure Exam Protocol Without Trusted PartiesGiampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan. 495-509 [doi]
- ApkCombiner: Combining Multiple Android Apps to Support Inter-App AnalysisLi Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon. 513-527 [doi]
- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app PurchasesFrancisco Vigário, Miguel Neto, Diogo Fonseca, Mário M. Freire, Pedro R. M. Inácio. 528-541 [doi]
- An Empirical Study on Android for Saving Non-shared Data on Public StorageXiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang. 542-556 [doi]
- The Dual-Execution-Environment Approach: Analysis and Comparative EvaluationMohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah. 557-570 [doi]
- On the Privacy, Security and Safety of Blood Pressure and Diabetes AppsKonstantin Knorr, David Aspinall, Maria Wolters. 571-584 [doi]
- A Cloud-Based eHealth Architecture for Privacy Preserving Data IntegrationAlevtina Dubovitskaya, Visara Urovi, Matteo Vasirani, Karl Aberer, Michael Ignaz Schumacher. 585-598 [doi]
- Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness ProblemsKonstantinos Maraslis, Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mo Haghighi. 601-615 [doi]
- Securing BACnet's PitfallsJaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier 0001. 616-629 [doi]
- On the Secure Distribution of Vendor-Specific Keys in Deployment ScenariosNicolai Kuntze, Carsten Rudolph. 630-644 [doi]