Abstract is missing.
- A Mission-centric Framework for Cyber Situational AwarenessSushil Jajodia.
- Cyberinfrastructure for eScience and eBusiness from Clouds to ExascaleGeoffrey Charles Fox.
- A Perspective of the Networks of the Future and Smart CitiesLuis M. Correia.
- Making Sense of All Things Handwritten - From Postal Addresses to Tablet NotesVenu Govindaraju.
- Practical Applications of Homomorphic EncryptionMichael Brenner, Henning Perl, Matthew Smith. 5-14
- Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover ImagesNagaraj V. Dharwadkar, B. B. Amberker. 15-24
- Improved "Partial Sums"-based Square Attack on AESMichael Tunstall. 25-34
- Two Dragons - A Family of Fast Word-based Stream CiphersMatt Henricksen. 35-44
- Identity-based Password-Authenticated Key Exchange for Client/Server ModelXun Yi, Raylin Tso, Eiji Okamoto. 45-54
- Tampering with Java Card Exceptions - The Exception Proves the RuleGuillaume Barbu, Philippe Hoogvorst, Guillaume Duc. 55-63
- Quantitative Assessment of Cloud Security Level Agreements - A Case StudyJesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri. 64-73
- Privacy-preserving Targeted Advertising Scheme for IPTV using the CloudLeyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik. 74-83
- Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext StructureKeita Emura, Mohammad Shahriar Rahman. 84-93
- SIMD-based Implementations of Eta Pairing Over Finite Fields of Small CharacteristicsAnup Kr. Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer. 94-101
- Homomorphic Primitives for a Privacy-friendly Smart Metering ArchitectureBenjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge. 102-112
- Flexible Redactable Signature Schemes for Trees - Extended Security Model and ConstructionHenrich Christopher Pöhls, Kai Samelin, Hermann de Meer, Joachim Posegga. 113-125
- High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation ApproachGeorge Athanasiou, Chara I. Chalkou, D. Bardis, Harris E. Michail, George Theodoridis, Costas E. Goutis. 126-135
- Private Outsourcing of Matrix Multiplication over Closed Semi-ringsMikhail J. Atallah, Keith B. Frikken, Shumiao Wang. 136-144
- Extension of de Weger's Attack on RSA with Large Public KeysNicolas T. Courtois, Theodosis Mourouzis, Pho V. Le. 145-153
- On Securing Communication from ProfilersSandra Diaz-Santiago, Debrup Chakraborty. 154-162
- Voice Passwords RevisitedChenguang Yang, Ghaith Hammouri, Berk Sunar. 163-171
- DDoS Detection with Information Theory Metrics and Netflows - A Real CaseDomenico Vitali, Antonio Villani, Angelo Spognardi, Roberto Battistoni, Luigi V. Mancini. 172-181
- Secure File Allocation and Caching in Large-scale Distributed SystemsAlessio Di Mauro, Alessandro Mei, Sushil Jajodia. 182-191
- Formal Analysis of the TLS Handshake ProtocolHanane Houmani, Mourad Debbabi. 192-205
- Analysis of Some Natural Variants of the PKP AlgorithmRodolphe Lampe, Jacques Patarin. 209-214
- VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation ChecksJulien Bringer, Alain Patey. 215-220
- Securing In-vehicle Communication and Redefining the Role of Automotive ImmobilizerConstantinos Patsakis, Kleanthis Dellios. 221-226
- Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data ProtectionYuyu Chou, Jan Oetting, Olga Levina. 227-232
- Security Policies in Dynamic Service CompositionsJulian Schütte, Hervais Simo Fhom, Mark Gall. 233-238
- Towards Pervasive Cryptographic Access Control ModelsMikko Kiviharju. 239-244
- Cryptographic Enforcement of Access Control while Mitigating Key SharingKeith B. Frikken. 245-250
- Verifying Privacy by Little Interaction and No Process EquivalenceDenis Butin, Giampaolo Bella. 251-256
- A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to ImplementationPhilippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen. 257-262
- Biometric Identification in Virtual Worlds using Biometric Fusion TechniquesAhmed Al-Khazzar, Nick Savage. 263-269
- On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash FunctionHarris E. Michail, George Athanasiou, Andreas Gregoriades, George Theodoridis, Costas E. Goutis. 270-275
- Key Management as a ServiceLiran Lerman, Olivier Markowitch, Jorge Nakahara Jr.. 276-281
- Secure and Seamless Session Management in Mobile and Heterogeneous EnvironmentAli Hammami, Noëmie Simoni. 282-289
- A Collaborative Firewall for Wireless Ad-Hoc Social NetworksLeonardo Maccari. 290-295
- Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple CountermeasuresMarek Klonowski, Piotr Syga, Wojciech Wodo. 296-301
- An Improved Public-key Tracing Scheme with Sublinear Ciphertext SizeChiara Valentina Schiavo, Andrea Visconti. 302-307
- Data Repository for Security Information and Event Management in Service InfrastructuresIgor Kotenko, Olga Polubelova, Igor Saenko. 308-313
- Distributed Threshold Certificate based Encryption Scheme with No Trusted DealerApostolos P. Fournaris. 314-320
- Improving Cloud Survivability through Dependency based Virtual Machine PlacementMin Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, Xubin He. 321-326
- PPiTTA - Preserving Privacy in TV Targeted AdvertisingTzachy Reinman, Erez Waisbard. 327-332
- Quantifying the Benefits of File Size Information for Forensic Hash MatchingJohan Garcia. 333-338
- Inverting Thanks to SAT Solving - An Application on Reduced-step MD*Florian Legendre, Gilles Dequen, Michaël Krajecki. 339-344
- Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic AlgorithmDeepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf. 345-350
- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key RandomizationKeita Emura, Takashi Sato. 353-357
- lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor NetworksAnna Sojka, Krzysztof Piotrowski. 358-363
- On Secure Communication over Wireless Sensor NetworksStefan Rass, Michal Koza. 364-367
- Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed DatabasesNirali R. Nanavati, Devesh C. Jinwala. 368-371
- Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize StrategyYonglin Sun, Yongjun Wang, Yi Zhang. 372-378
- ADQL: A Flexible Access Definition and Query Language to Define Access Control ModelsAndreas C. Sonnenbichler, Andreas Geyer-Schulz. 379-386
- Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple RecipientsRainer Schick, Christoph Ruland. 387-390
- Attack Modelling and Security Evaluation for Security Information and Event ManagementIgor Kotenko, Andrey Chechulin, Evgenia Novikova. 391-394
- Sevigator: Network Confinement of Malware Applications and Untrusted Operating SystemsDenis Efremov, Nikolay V. Pakulin. 395-398
- Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery ProtocolMartin Schütte, Thomas Scheffler, Bettina Schnor. 399-402
- The Concept of Compatibility between Identity-based and Certificateless Encryption SchemesAntigoni Polychroniadou, Konstantinos Chalkias, George Stephanides. 403-407
- iSATS: Leveraging Identity based Sender Authentication for Spam MitigationSufian Hameed, Tobias Kloht, Xiaoming Fu. 408-411
- Adaptive Speech Watermarking in Wavelet Domain based on LogarithmMehdi Fallahpour, David Megías, Hossein Najaf-Zadeh. 412-415
- Defense Against TCP Flooding AttackSeungyong Yoon, Jintae Oh, Ikkyun Kim, Jongsoo Jang. 416-420
- An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity ManagementJulien Bringer, Hervé Chabanne, Alain Patey. 421-425
- A Novel Fuzzy Vault Scheme for Secret Key ExchangeLin You, Jie Lu. 426-429
- Network-based Executable File Extraction and Analysis for Malware DetectionByoung-Koo Kim, Ikkyun Kim, Tai-Myoung Chung. 430-433
- HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction HoneypotsPatrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. 434-439
- A Proposed Framework for Analysing Security CeremoniesMarcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio. 440-445