Abstract is missing.
- Coercion-Resistant Proxy VotingOksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi, Melanie Volkamer. 3-16 [doi]
- A Posteriori Openable Public Key EncryptionXavier Bultel, Pascal Lafourcade. 17-31 [doi]
- Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart GridSérgio M. Câmara, Dhananjay Anand, Victoria Pillitteri, Luiz F. R. C. Carmo. 32-46 [doi]
- Developing a Human Activity Model for Insider IS Security Breaches Using Action Design ResearchGurpreet Dhillon, Spyridon Samonas, Ugo Etudo. 49-61 [doi]
- Evaluating CVSS Base Score Using Vulnerability Rewards ProgramsAwad A. Younis, Yashwant K. Malaiya, Indrajit Ray. 62-75 [doi]
- Defining Objectives for Preventing CyberstalkingGurpreet Dhillon, Chandrashekar Challa, Kane Smith. 76-87 [doi]
- Using Process Invariants to Detect Cyber Attacks on a Water Treatment SystemSridhar Adepu, Aditya Mathur. 91-104 [doi]
- Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS CloudYanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey. 105-118 [doi]
- Software Defined Networking Reactive Stateful FirewallSalaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens. 119-132 [doi]
- Teaching Phishing-Security: Which Way is Best?Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer, Alexandra Kunz, Philipp Rack, Daniel Lehmann. 135-149 [doi]
- On Gender Specific Perception of Data Sharing in JapanMarkus Tschersich, Shinsaku Kiyomoto, Sebastian Pape, Toru Nakamura, Gökhan Bal, Haruo Takasaki, Kai Rannenberg. 150-160 [doi]
- TORPEDO: TOoltip-poweRed Phishing Email DetectiOnMelanie Volkamer, Karen Renaud, Benjamin Reinheimer. 161-175 [doi]
- SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social NetworksDieudonne Mulamba, Indrajit Ray, Indrakshi Ray. 179-193 [doi]
- Collateral Damage of Facebook Apps: Friends, Providers, and Privacy InterdependenceIraklis Symeonidis, Fatemeh Shirazi, Gergely Biczók, Cristina Pérez-Solà, Bart Preneel. 194-208 [doi]
- Automated Source Code Instrumentation for Verifying Potential VulnerabilitiesHongzhe Li, Jaesang Oh, Hakjoo Oh, Heejo Lee. 211-226 [doi]
- An Information Flow-Based Taxonomy to Understand the Nature of Software VulnerabilitiesDaniela Oliveira, Jedidiah Crandall, Harry A. Kalodner, Nicole Morin, Megan Maher, Jesús Navarro, Felix Emiliano. 227-242 [doi]
- XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application ScannersEnrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero. 243-258 [doi]
- A Utility-Based Reputation Model for the Internet of ThingsBenjamin Aziz, Paul Fremantle, Rui Wei, Álvaro Enrique Arenas. 261-275 [doi]
- Advanced Remote Firmware Upgrades Using TPM 2.0Andreas Fuchs, Christoph Krauß, Jürgen Repp. 276-289 [doi]
- RegRSA: Using Registers as Buffers to Resist Memory Disclosure AttacksYuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, ZiQiang Ma. 293-307 [doi]
- Uncertain? No, It's Very Certain! - Recovering the Key from Guessing Entropy Enhanced CPAChanghai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai. 308-320 [doi]
- Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted MalwarePing Chen, Christophe Huygens, Lieven Desmet, Wouter Joosen. 323-336 [doi]
- NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native LibrariesYu-Yang Hong, Yu-Ping Wang, Jie Yin. 337-351 [doi]
- A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control MonitorAndrew Bedford, Stephen Chong, Josée Desharnais, Nadia Tawbi. 352-366 [doi]
- Deducing User Presence from Inter-Message Intervals in Home Automation SystemsFrederik Möllers, Christoph Sorge. 369-383 [doi]
- Privacy by Design Principles in Design of New Generation Cognitive Assistive TechnologiesElla Kolkowska, Annica Kristofferson. 384-397 [doi]
- A Trustless Privacy-Preserving Reputation SystemAlexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie. 398-411 [doi]