Abstract is missing.
- InCC: Hiding Information by Mimicking Traffic In Network FlowsLuis Campo-Giralte, Cristina Conde, Isaac Martín de Diego, Enrique Cabello. 5-14
- Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic CurvesChristian Hanser, Daniel Slamanig. 15-26
- Improving Block Cipher Design by Rearranging Internal OperationsLiran Lerman, Jorge Nakahara Jr., Nikita Veshchikov. 27-38
- A Security-enhanced Design Methodology for Embedded SystemsAlberto Ferrante, Jelena Milosevic, Marija Janjusevic. 39-50
- A Key-revocable Attribute-based Encryption for Mobile Cloud EnvironmentsTsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake. 51-61
- Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access ControlLan Zhou, Vijay Varadharajan, Michael Hitchens. 62-73
- A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into SoftwareIoannis Chionis, Maria Chroni, Stavros D. Nikolopoulos. 74-85
- HoneydV6: A Low-interaction IPv6 HoneypotSven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler, Eldad Zack. 86-97
- Which Side Are You On? - A New Panopticon vs. PrivacyMiltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis. 98-110
- Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVALYu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta. 111-122
- Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber AttacksEster Ciancamerla, Michele Minichino, S. Palmieri. 123-134
- Towards Cryptographic Function Distinguishers with Evolutionary CircuitsPetr Svenda, Martin Ukrop, Vashek Matyas. 135-146
- Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access ControlBo Lang, Runhua Xu, Yawei Duan. 147-157
- Secure Second Price Auctions with a Rational AuctioneerBoaz Catane, Amir Herzberg. 158-169
- iOS Encryption Systems - Deploying iOS Devices in Security-critical EnvironmentsPeter Teufl, Thomas Zefferer, Christof Stromberger, Christoph Hechenblaikner. 170-182
- Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of DataSimone Bongiovanni, Giuseppe Scotti, Alessandro Trifiletti. 183-194
- Behavior-based Malware Analysis using Profile Hidden Markov ModelsSaradha Ravi, N. Balakrishnan, Bharath Venkatesh. 195-206
- An Efficient Approach to Assessing the Risk of Zero-Day VulnerabilitiesMassimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang. 207-218
- Secure Alert Tracking in Supply ChainMehdi Khalfaoui, Refik Molva, Laurent Gomez. 219-229
- Differential Power Analysis of HMAC SHA-2 in the Hamming Weight ModelSonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre. 230-241
- Secure Computation of Hidden Markov ModelsMehrdad Aliasgari, Marina Blanton. 242-253
- Adaptive Resource Management for Balancing Availability and Performance in Cloud ComputingRavi Jhawar, Vincenzo Piuri. 254-264
- Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc NetworksJan Hajny, Lukas Malina, Zdenek Martinasek, Vaclav Zeman. 267-274
- Topological Study and Lyapunov Exponent of a Secure Steganographic SchemeJacques M. Bahi, Nicolas Friot, Christophe Guyeux. 275-283
- LMM - A Common Component for Software License Management on CloudShinsaku Kiyomoto, Andre Rein, Yuto Nakano, Carsten Rudolph, Yutaka Miyake. 284-295
- Dynamic Proofs of Retrievability from Chameleon-HashesStefan Rass. 296-304
- On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block CiphersRuth Ng Ii-Yung, Khoongming Khoo, Raphael C.-W. Phan. 305-312
- Redactable Signature Scheme for Tree-structured Data based on Merkle TreeShoichi Hirose, Hidenori Kuwakado. 313-320
- SVD-based Digital Image Watermarking on approximated Orthogonal MatrixYevhen Zolotavkin, Martti Juhola. 321-330
- Massive Group Message Authentication with Revocable AnonymityBoaz Catane, Amir Herzberg. 331-338
- Partially Wildcarded Attribute-based Encryption and Its Efficient ConstructionGo Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai. 339-346
- Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android SmartphonesThomas Zefferer, Peter Teufl. 347-354
- Intent Security Testing - An Approach to Testing the Intent-based Vulnerability of Android ComponentsSébastien Salva, Stassia R. Zafimiharisoa, Patrice Laurençot. 355-362
- Preimage Attack on BioHashingPatrick Lacharme, Estelle Cherrier, Christophe Rosenberger. 363-370
- An Efficient and Provably Secure Certificateless Identification SchemeJi-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng. 371-378
- Improving 802.11 Fingerprinting of Similar Devices by Cooperative FingerprintingClémentine Maurice, Stéphane Onno, Christoph Neumann, Olivier Heen, Aurélien Francillon. 379-386
- Instance-based Anomaly Method for Android Malware DetectionBorja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, Pablo Garcia Bringas. 387-394
- A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining CapabilitiesMaider Huarte, Iñaki Goirizelaia, Juan José Unzilla, Jon Matías, Juan J. Igarza. 395-402
- Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word GraphsRolf Haynberg, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade. 403-410
- Enhanced Truncated Differential Cryptanalysis of GOSTNicolas T. Courtois, Theodosis Mourouzis, Michal Misztal. 411-418
- Privacy-preserving Realization of the STORK Framework in the Public CloudBernd Zwattendorfer, Daniel Slamanig. 419-426
- The Usability of CAPTCHAs on SmartphonesGerardo Reynaga, Sonia Chiasson. 427-434
- From a Logical Approach to Internal States of Hash Functions - How SAT Problem Can Help to Understand SHA-* and MD*Florian Legendre, Gilles Dequen, Michaël Krajecki. 435-443
- Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABEMichael Clear, Ciaran McGoldrick. 444-452
- Recovering RSA Private Keys on Implementations with Tampered LSBsConstantinos Patsakis. 453-460
- On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based DevicesGolam Sarwar, Olivier Mehani, Roksana Boreli, Mohamed Ali Kâafar. 461-468
- Non-random Properties of Compression and Hash Functions using Linear CryptanalysisDaniel Santana de Freitas, Jorge Nakahara Jr.. 471-477
- On the Connection between t-Closeness and Differential Privacy for Data ReleasesJosep Domingo-Ferrer. 478-481
- AVON - A Fast Hash Function for Intel SIMD ArchitecturesMatt Henricksen, Shinsaku Kiyomoto. 482-487
- Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APsJonny Milliken, Valerio Selis, Kian Meng Yap, Alan Marshall. 488-493
- Are Biometric Web Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open NetworksDustin van der Haar, Basie von Solms. 494-499
- Abusing Social Networks with Abuse Reports - A Coalition Attack for Social NetworksSlim Trabelsi, Hana Bouafif. 500-505
- Diagnostic Category Leakage in Helper Data Schemes for Biometric AuthenticationJoep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz. 506-511
- A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy Preserving Distributed Data MiningNirali R. Nanavati, Devesh C. Jinwala. 512-517
- Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random OraclesKazuki Yoneyama. 518-523
- Identity Security in Biometric Systems based on KeystrokingLucjan Hanzlik, Wojciech Wodo. 524-530
- Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic ApplicationsVinay S. Iyengar. 531-536
- Related-key Impossible Differential Cryptanalysis of Full-round HIGHTSaeed Rostami, Sadegh Bamohabbat Chafjiri, Seyed Amir Hossein Tabatabaei. 537-542
- Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor NetworksMickaël Cazorla, Kevin Marquet, Marine Minier. 543-548
- Privacy-enhanced Perceptual Hashing of Audio DataHeiko Knospe. 549-554
- Efficient Group Signatures with Verifier-local Revocation Employing a Natural ExpirationLukas Malina, Jan Hajny, Zdenek Martinasek. 555-560
- Public-key Cryptography from Different Assumptions - A Multi-bit VersionHervé Chabanne, Gérard D. Cohen, Alain Patey. 561-567
- Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPsZ. Cliffe Schreuders, Adil M. Bhat. 568-573
- Approaching Encryption through Complex Number LogarithmsGeorge Stergiopoulos, Miltiadis Kandias, Dimitris Gritzalis. 574-579
- Keystroke Authentication with a Capacitive Display using Different Mobile DevicesMatthias Trojahn, Christian Schadewald, Frank Ortmeier. 580-585
- MINHO - A Novel Authentication Scheme based on Pre-Authentication ServiceHasan Kadhem. 586-594
- A Model-driven Approach for Securing Software ArchitecturesMario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, Stefano Paraboschi. 595-602
- Database Anomalous Activities - Detection and QuantificationElisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone. 603-608
- A Preliminary Application of Generalized Fault Trees to SecurityDaniele Codetta Raiteri. 609-614
- E3SN - Efficient Security Scheme for Sensor NetworksHassan Noura, Steven Martin, Khaldoun Al Agha. 615-621