Abstract is missing.
- Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control SystemsCristina Alcaraz, Javier Lopez, Kim-Kwang Raymond Choo. 19-27 [doi]
- Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race ConditionsGeorge Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis, Theodore K. Apostolopoulos. 28-40 [doi]
- FPGA Implementation of HS1-SIVGerben Geltink, Sergei Volokitin. 41-48 [doi]
- Subdomain and Access Pattern Privacy - Trading off Confidentiality and PerformanceJohannes Schneider, Bin Lu, Thomas Locher, Yvonne Anne Pignolet, Matús Harvan, Sebastian Obermeier. 49-60 [doi]
- Private Multi-party Matrix Multiplication and Trust ComputationsJean-Guillaume Dumas, Pascal Lafourcade 0001, Jean-Baptiste Orfila, Maxime Puys. 61-72 [doi]
- A Friend or a Foe? Detecting Malware using Memory and CPU FeaturesJelena Milosevic, Miroslaw Malek, Alberto Ferrante. 73-84 [doi]
- Oblivious Voting: Hiding Votes from the Voting Machine in Bingo VotingDirk Achenbach, Bernhard Löwe, Jörn Müller-Quade, Jochen Rill. 85-96 [doi]
- Silent and Continuous Authentication in Mobile EnvironmentGerardo Canfora, Paolo Di Notte, Francesco Mercaldo, Corrado Aaron Visaggio. 97-108 [doi]
- Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade ControllersBogdan Groza, Pal-Stefan Murvay, Tudor Andreica. 109-120 [doi]
- Transitioning to a Javascript Voting Client for Remote Online VotingJordi Cucurull, Sandra Guasch, David Galindo. 121-132 [doi]
- PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in CloudsSana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia. 133-146 [doi]
- Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login SolutionGiada Sciarretta, Alessandro Armando, Roberto Carbone, Silvio Ranise. 147-158 [doi]
- PACCo: Privacy-friendly Access Control with ContextAndreas Put, Bart De Decker. 159-170 [doi]
- Towards Access Control for Isolated ApplicationsKirill Belyaev, Indrakshi Ray. 171-182 [doi]
- LP-Cache: Privacy-aware Cache Model for Location-based AppsAsma Patel, Esther Palomar. 183-194 [doi]
- The Mathematical Foundations for Mapping Policies to Network DevicesDinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner. 197-206 [doi]
- Sensor-based Wearable PUFKazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto. 207-214 [doi]
- Hardware Accelerator for Stream Cipher SpritzDebjyoti Bhattacharjee, Anupam Chattopadhyay. 215-222 [doi]
- Lean and Fast Secure Multi-party Computation: Minimizing Communication and Local Computation using a HelperJohannes Schneider. 223-230 [doi]
- A Template Attack Against VERIFY PIN AlgorithmsHélène Le Bouder, Thierno Barry, Damien Couroussé, Jean-Louis Lanet, Ronan Lashermes. 231-238 [doi]
- A Practical Encrypted MicroprocessorPeter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001. 239-250 [doi]
- Two Secure Anonymous Proxy-based Data StoragesOlivier Blazy, Xavier Bultel, Pascal Lafourcade 0001. 251-258 [doi]
- User-friendly Manual Transfer of Authenticated Online Banking Transaction Data - A Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information SchemeSven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen. 259-270 [doi]
- Web-based Fingerprinting TechniquesVitor Bernardo, Dulce Domingos. 271-282 [doi]
- 3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the CloudManoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello. 283-291 [doi]
- Protecting Databases from Schema Disclosure - A CRUD-Based Protection ModelÓscar Mortágua Pereira, Diogo Domingues Regateiro, Rui L. Aguiar. 292-301 [doi]
- FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case StudyBakiri Mohammed, Jean-François Couchot, Christophe Guyeux. 302-309 [doi]
- How I Met Your Mother? - An Empirical Study about Android Malware PhylogenesisGerardo Canfora, Francesco Mercaldo, Antonio Pirozzi, Corrado Aaron Visaggio. 310-317 [doi]
- On the Evaluation of the Privacy Breach in Disassociated Set-valued DatasetsSara Barakat, Bechara al Bouna, Mohamed Nassar, Christophe Guyeux. 318-326 [doi]
- OSCIDS: An Ontology based SCADA Intrusion Detection FrameworkAbdullah Al Balushi, Kieran McLaughlin, Sakir Sezer. 327-335 [doi]
- Differential Addition in Edwards Coordinates Revisited and a Short Note on Doubling in Twisted Edwards FormSrinivasa Rao Subramanya Rao. 336-343 [doi]
- Verifiable Policy-defined Networking for Security ManagementDinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung X. Nguyen, Marian Mihailescu, Michelle McClintock. 344-351 [doi]
- Practical Application of Order-preserving Encryption in Wide Column StoresTim Waage, Daniel Homann, Lena Wiese. 352-359 [doi]
- Threats to 5G Group-based AuthenticationRosario Giustolisi, Christian Gehrmann. 360-367 [doi]
- Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett MultiplicationsAndrea Lesavourey, Christophe Nègre, Thomas Plantard. 368-375 [doi]
- ISDSR: Secure DSR with ID-based Sequential Aggregate SignatureKenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara. 376-387 [doi]
- A Pre-clustering Method To Improve Anomaly DetectionDenis Hock, Martin Kappes, Bogdan V. Ghita. 391-396 [doi]
- A Metaphone based Chaotic Searchable Encryption Algorithm for Border ManagementAbir Awad, Brian Lee. 397-402 [doi]
- Towards a Software Approach to Mitigate Correlation Power AnalysisIbraheem Frieslaar, Barry Irwin. 403-410 [doi]
- Towards Practical k-Anonymization: Correlation-based Construction of Generalization HierarchyTomoaki Mimoto, Anirban Basu, Shinsaku Kiyomoto. 411-418 [doi]
- The Cost of Breaking a Quantum Bit Commitment Protocol on Equivalence ClassesAhmet Emin Tatar, Marius Nagy, Naya Nagy. 419-423
- A Second Order Derivatives based Approach for SteganographyJean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux. 424-431 [doi]
- A Code-based Group Signature Scheme with Shorter Public Key LengthHafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi. 432-439 [doi]
- Distributed Data Aggregation in Wireless Sensor Network - with Peer VerificationSumanta Chatterjee, Alwyn R. Pais, Sumit Saurabh. 440-445 [doi]
- Enhancing Operation Security using Secret SharingMohsen Ahmadvand, Antoine Scemama, Martín Ochoa, Alexander Pretschner. 446-451 [doi]
- Computations on Private Sets and their Application to Biometric based Authentication SystemsWojciech Wodo, Lucjan Hanzlik, Kamil Kluczniak. 452-457 [doi]
- Thermal Imaging Attacks on Keypad Security SystemsWojciech Wodo, Lucjan Hanzlik. 458-464 [doi]
- Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher SimonNicolas T. Courtois, Pouyan Sepehrdad, Guangyan Song, Iason Papapanagiotakis-Bousy. 465-470 [doi]
- Efficient Proxy Signature Scheme from PairingsFrancesco Buccafurri, Rajeev Anand Sahu, Vishal Saraswat. 471-476 [doi]
- Predictive Model for Exploit Kit based AttacksSlim Trabelsi, Skander Ben Mahmoud, Anis Zouaoui. 477-482 [doi]
- Multi-Device Authentication using Wearables and IoTJan Hajny, Petr Dzurenda, Lukas Malina. 483-488 [doi]