Abstract is missing.
- WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary ModificationJennifer Bellizzi, Mark Vella. 5-15 [doi]
- A Flexible Architecture for Industrial Control System HoneypotsAlexandru Vlad Serbanescu, Sebastian Obermeier, Der-Yeuan Yu. 16-26 [doi]
- Mobile Malware Detection using Op-code Frequency HistogramsGerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio. 27-38 [doi]
- Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary AttackYukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto. 39-52 [doi]
- Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative MetricsMalek Belhaouane, Joaquín García-Alfaro, Hervé Debar. 53-64 [doi]
- Formal Analysis of E-Cash ProtocolsJannik Dreier, Ali Kassem, Pascal Lafourcade. 65-75 [doi]
- Algorithmic Information Theory for Obfuscation SecurityRabih Mohsen, Alexandre Miranda Pinto. 76-87 [doi]
- A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinuxPeter Amthor. 88-99 [doi]
- Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the PositionGeorge Stergiopoulos, Panagiotis Petsanas, Panagiotis Katsaros, Dimitris Gritzalis. 100-111 [doi]
- Preserving Privacy in Collaborative Business Process CompositionHassaan Irshad, Basit Shafiq, Jaideep Vaidya, Muhammad Ahmed Bashir, Shafay Shamail, Nabil R. Adam. 112-123 [doi]
- An OWL-based XACML Policy FrameworkFabio Marfia, Mario Arrigoni Neri, Filippo Pellegrini, Marco Colombetti. 124-135 [doi]
- New Results for Partial Key Exposure on RSA with Exponent BlindingStelvio Cimato, Silvia Mella, Ruggero Susella. 136-147 [doi]
- On the Instability of Sensor Orientation in Gait Verification on Mobile PhoneThang Hoang, Deokjai Choi, Thuc Dinh Nguyen. 148-159 [doi]
- + ProtocolAhmad Khoureich Ka. 163-169 [doi]
- Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products DeliveryCatalin V. Birjoveanu. 170-177 [doi]
- A Framework for Incident Response in Industrial Control SystemsRoman Schlegel, Ana Hristova, Sebastian Obermeier. 178-185 [doi]
- Controlled Proxy Re-signing - Conditional Proxy Re-SignaturesS. Sree Vivek, Guhan Balasubramanian. 186-193 [doi]
- A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File ExchangeLuigi Maria Bottasso. 194-201 [doi]
- Parallel Approaches for Efficient Scalar Multiplication over Elliptic CurveChristophe Nègre, Jean-Marc Robert. 202-209 [doi]
- Policy Anomaly Detection for Distributed IPv6 FirewallsClaas Lorenz, Bettina Schnor. 210-219 [doi]
- Secure Physical Access Control with Strong Cryptographic ProtectionJan Hajny, Petr Dzurenda, Lukas Malina. 220-227 [doi]
- MEDA: A Machine Emulation Detection AlgorithmValerio Selis, Alan Marshall. 228-235 [doi]
- Monitoring Software Vulnerabilities through Social Networks AnalysisSlim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari. 236-242 [doi]
- Private Eyes: Secure Remote Biometric AuthenticationEwa Syta, Michael J. Fischer, David Wolinsky, Abraham Silberschatz, Gina Gallegos-García, Bryan Ford. 243-250 [doi]
- Practical IBE Secure under CBDH - Encrypting Without PairingS. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra, C. Pandu Rangan. 251-258 [doi]
- Revealing Encrypted WebRTC Traffic via Machine Learning ToolsMario Di Mauro, Maurizio Longo. 259-266 [doi]
- DPA Resistance Enhancement through a Self-healing PLL based Power MaskFleura Hajilou, Ehsan Mazidi, Shahab Ardalan. 267-272 [doi]
- Design and Performance Aspects of Information Security Prediction Markets for Risk ManagementPankaj Pandey, Einar Arthur Snekkenes. 273-284 [doi]
- MoCrySIL - Carry Your Cryptographic Keys in Your PocketFlorian Reimair, Peter Teufl, Christian Kollmann, Christoph Thaller. 285-292 [doi]
- Modeling Authorization Policies for Web Services in Presence of Transitive DependenciesWorachet Uttha, Clara Bertolissi, Silvio Ranise. 293-300 [doi]
- Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?Zisis Tsiatsikas, Alexandros Fakis, Dimitrios Papamartzivanos, Dimitris Geneiatakis, Georgios Kambourakis, Constantinos Kolias. 301-308 [doi]
- Solving the Grid Defender's Dilemma: Tamper Protection for Distributed Cyber-Physical SystemsJason Reeves, Sean W. Smith. 309-316 [doi]
- Attack Surface and Vulnerability Assessment of Automotive Electronic Control UnitsMartin Salfer, Hendrik Schweppe, Claudia Eckert. 317-326 [doi]
- Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FETKaibin Huang, Yu-Chi Chen, Raylin Tso. 327-334 [doi]
- Cloud Resources Placement based on Functional and Non-functional RequirementsAsma Guesmi, Patrice Clemente, Frédéric Loulergue, Pascal Berthomé. 335-342 [doi]
- Distributed Intrusion Detection System based on Anticipation and Prediction ApproachHajar Benmoussa, Anas Abou El Kalam, Abdellah Ait Ouahman. 343-348 [doi]
- Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key EstablishmentLukas Malina, Petr Munster, Jan Hajny, Tomás Horváth. 349-354 [doi]
- Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban EnvironmentAlexey D. Smolyakov, Amir I. Sulimov, Arkadij V. Karpov, Aidar V. Galiev. 355-360 [doi]
- Light Blind: Why Encrypt If You Can Share?Pierpaolo Cincilla, Aymen Boudguiga, Makhlouf Hadji, Arnaud Kaiser. 361-368 [doi]
- Scargos: Towards Automatic Vulnerability DistributionFlorian Rhinow, Michael Clear. 369-376 [doi]
- A Formally Verified Access Control Mechanism for Information Centric NetworksMahdi Aiash, Jonathan Loo. 377-383 [doi]
- A Note on Schoenmakers Algorithm for Multi ExponentiationSrinivasa Rao Subramanya Rao. 384-391 [doi]
- Performance Evaluation of Meteor Key DistributionAmir I. Sulimov, Arkadij V. Karpov. 392-397 [doi]
- A Key-private Cryptosystem from the Quadratic ResiduosityMarc Joye. 398-404 [doi]
- Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion DetectionTayeb Kenaza, Abdenour Labed, Yacine Boulahia, Mohcen Sebehi. 405-412 [doi]
- Counter based Detection and Mitigation of Signalling AttacksMihajlo Pavloski, Gökçe Görbil, Erol Gelenbe. 413-418 [doi]
- Examining the Performance for Forensic Detection of Rare Videos Under Time ConstraintsJohan Garcia. 419-426 [doi]
- Phish-IDetector: Message-Id Based Automatic Phishing DetectionRakesh M. Verma, Nirmala Rai. 427-434 [doi]
- Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance RegulationsEduardo B. Fernandez, Dereje Yimam. 435-440 [doi]
- Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AESBholanath Roy, Ravi Prakash Giri, Ashokkumar C., Bernard Menezes. 441-447 [doi]
- Practical and Secure Integrated PKE+PEKS with Keyword PrivacyFrancesco Buccafurri, Gianluca Lax, Rajeev Anand Sahu, Vishal Saraswat. 448-453 [doi]
- A Risk Awareness Approach for Monitoring the Compliance of RBAC-based PoliciesFaouzi Jaïdi, Faten Labbene-Ayachi. 454-459 [doi]