Abstract is missing.
- Freeze & Crypt: Linux Kernel Support for Main Memory EncryptionManuel Huber 0001, Julian Horsch, Junaid Ali, Sascha Wessel. 17-30 [doi]
- A Lightweight Integrity Protection Scheme for Fast Communications in Smart GridAlireza Jolfaei, Krishna Kant. 31-42 [doi]
- Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical MemoryDiogo Barradas, Tiago Brito, David Duarte, Nuno Santos 0001, Luís Rodrigues. 43-54 [doi]
- Formally Verifying Flow Properties in Industrial SystemsJannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade 0001, Jean-Louis Roch. 55-66 [doi]
- Attribute based Encryption for Multi-level Access Control PoliciesNesrine Kaaniche, Maryline Laurent. 67-78 [doi]
- Mobile Silent and Continuous Authentication using Apps SequenceGerardo Canfora, Giovanni Cappabianca, Pasquale Carangelo, Fabio Martinelli, Francesco Mercaldo, Ernesto Rosario Russo, Corrado Aaron Visaggio. 79-91 [doi]
- The Efficient Randomness Testing using Boolean FunctionsMarek Sýs, Dusan Klinec, Petr Svenda. 92-103 [doi]
- First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based CryptographyDamien Jauvart, Jacques J. A. Fournier, Louis Goubin. 104-115 [doi]
- Analysis of Intrusion Detection Systems in Industrial EcosystemsJuan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier Lopez. 116-128 [doi]
- Face Recognition-based Presentation Attack Detection in a Two-step Segregated Automated Border Control e-Gate - Results of a Pilot Experience at Adolfo Suárez Madrid-Barajas AirportDavid Ortega del Campo, Cristina Conde, Ángel Serrano, Isaac Martín de Diego, Enrique Cabello. 129-138 [doi]
- Privacy-Preserving Verifiability - A Case for an Electronic Exam ProtocolRosario Giustolisi, Vincenzo Iovino, Gabriele Lenzini. 139-150 [doi]
- On the Relation Between SIM and IND-RoR Security Models for PAKEsJosé Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot. 151-162 [doi]
- SLAP: Secure Lightweight Authentication Protocol for Resource-constrained DevicesGiulio Aliberti, Roberto Di Pietro, Stefano Guarino. 163-174 [doi]
- Using a History-based Profile to Detect and Respond to DDoS AttacksNegar Mosharraf, Anura P. Jayasumana, Indrakshi Ray. 175-186 [doi]
- LOCALPKI: A User-Centric Formally Proven Alternative to PKIXJean-Guillaume Dumas, Pascal Lafourcade 0001, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel. 187-199 [doi]
- Practical Passive Leakage-abuse Attacks Against Symmetric Searchable EncryptionMatthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade 0001. 200-211 [doi]
- Constant-size Threshold Attribute based SignCryption for Cloud ApplicationsSana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia. 212-225 [doi]
- Accelerating Square Root Computations Over Large GF (2m)Salah Harb, Moath Jarrah. 229-236 [doi]
- SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR CompetitionAshutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk, Sebastian Wójtowicz. 237-246 [doi]
- On Obfuscating Compilation for Encrypted ComputingPeter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001. 247-254 [doi]
- Privacy-preserving Regression on Partially Encrypted DataMatús Harvan, Thomas Locher, Marta Mularczyk, Yvonne Anne Pignolet. 255-266 [doi]
- Mining Encrypted Software Logs using Alpha AlgorithmGamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk. 267-274 [doi]
- Differential and Rotational Cryptanalysis of Round-reduced MORUSAshutosh Dhar Dwivedi, Pawel Morawiecki, Sebastian Wójtowicz. 275-284 [doi]
- The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversityLouis Philippe Sondeck, Maryline Laurent, Vincent Frey. 285-294 [doi]
- One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGAMohammed Bakiri, Jean-François Couchot, Christophe Guyeux. 295-302 [doi]
- (In) Security in Graph Databases - Analysis and Data LeaksMiguel Hernández Boza, Alfonso Muñoz. 303-310 [doi]
- PB-PKI: A Privacy-aware Blockchain-based PKILouise Axon, Michael Goldsmith. 311-318 [doi]
- RmPerm: A Tool for Android Permissions RemovalSimone Aonzo, Giovanni Lagorio, Alessio Merlo. 319-326 [doi]
- HAIT: Heap Analyzer with Input TracingAndrea Atzeni, Andrea Marcelli, Francesco Muroni, Giovanni Squillero. 327-334 [doi]
- Evaluating Credit Card Transactions in the Frequency Domain for a Proactive Fraud Detection ApproachRoberto Saia, Salvatore Carta. 335-342 [doi]
- Some Remarks about Tracing Digital Cameras - Faster Method and Usable CountermeasureJaroslaw Bernacki, Marek Klonowski, Piotr Syga. 343-350 [doi]
- Adding Privacy Protection to Distributed Software SystemsGeorge O. M. Yee. 351-358 [doi]
- PAnTHErS: A Prototyping and Analysis Tool for Homomorphic Encryption SchemesCyrielle Feron, Vianney Lapotre, Loïc Lagadec. 359-366 [doi]
- Cryptographic Service Providers in Current Device Landscapes: An Inconvenient TruthFlorian Reimair, Johannes Feichtner, Dominik Ziegler, Sandra Kreuzhuber, Thomas Zefferer. 367-374 [doi]
- The Net Rat - Rethinking Connected Services for Increased SecurityBernd Prünster, Florian Reimair, Andreas Reiter. 375-383 [doi]
- Efficient Heuristic Safety Analysis of Core-based Security PoliciesPeter Amthor. 384-392 [doi]
- Short Paper: Industrial Feasibility of Private Information RetrievalAngela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad. 395-400 [doi]
- A Probabilistic Baby-step Giant-step AlgorithmPrabhat Kushwaha, Ayan Mahalanobis. 401-406
- Vector Quantization based Steganography for Secure Speech Communication SystemBekkar Laskar, Merouane Bouzid. 407-412 [doi]
- GLITCH: A Discrete Gaussian Testing Suite for Lattice-based CryptographyJames Howe, Máire O'Neill. 413-419 [doi]
- Program Execution Analysis using UserAssist Key in Modern WindowsBhupendra Singh, Upasna Singh. 420-429 [doi]
- Capturing the Effects of Attribute based Correlation on Privacy in Micro-databasesDebanjan Sadhya, Bodhi Chakraborty, Sanjay Kumar Singh. 430-436 [doi]
- Improving Throughput in BB84 Quantum Key DistributionShawn Prestridge, James Dunham. 437-443 [doi]
- A Review of PROFIBUS Protocol Vulnerabilities - Considerations for Implementing Authentication and Authorization ControlsVenesa Watson, Xinxin Lou, Yuan Gao. 444-449 [doi]
- FlowSlicer - A Hybrid Approach to Detect and Avoid Sensitive Information Leaks in Android Applications using Program Slicing and InstrumentationLuis Menezes, Roland Wismüller. 450-455 [doi]
- A Card-less TEE-based Solution for Trusted Access ControlMohamed Amine Bouazzouni, Emmanuel Conchon, Fabrice Peyrard, Pierre-François Bonnefoi. 456-461 [doi]
- s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtablesGerardo Canfora, Antonio Pirozzi, Aaron Visaggio. 462-467 [doi]
- Reputation Management in Online Social Networks - A New Clustering-based ApproachSana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia. 468-473 [doi]
- Interaction Platform for Improving Detection Capability of Dynamic Application Security TestingJonghwan Im, Jongwon Yoon, Minsik Jin. 474-479 [doi]
- Strong Authentication for e-Banking: A Survey on European Regulations and ImplementationsFederico Sinigaglia, Roberto Carbone, Gabriele Costa. 480-485 [doi]
- A Lightweight Online Advertising Classification System using Lexical-based FeaturesXichen Zhang, Arash Habibi Lashkari, Ali A. Ghorbani. 486-494 [doi]
- Formal Analyze of a Private Access Control Protocol to a Cloud StorageMouhebeddine Berrima, Pascal Lafourcade 0001, Matthieu Giraud, Narjes Ben Rajeb. 495-500 [doi]
- Differential-linear and Impossible Differential Cryptanalysis of Round-reduced ScreamAshutosh Dhar Dwivedi, Pawel Morawiecki, Sebastian Wójtowicz. 501-506 [doi]
- Experimental Assessment of Private Information Disclosure in LTE Mobile NetworksStig Fr. Mjølsnes, Ruxandra F. Olimid. 507-512 [doi]
- Towards a Self-adaptive Trust Management Model for VANETsIlhem Souissi, Nadia Ben Azzouna, Tahar Berradia. 513-518 [doi]
- On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption SchemesGaurav Pareek, B. R. Purushothama. 519-524 [doi]
- Privacy-preserving Disease Susceptibility Test with Shamir's Secret SharingGuyu Fan, Manoranjan Mohanty. 525-533 [doi]
- Anonymous Credentials with Practical Revocation using Elliptic CurvesPetr Dzurenda, Jan Hajny, Lukas Malina, Sara Ricci. 534-539 [doi]
- On the Application of Fuzzy Set Theory for Access Control EnforcementDiogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar. 540-547 [doi]
- Clustering-based Approach for Anomaly Detection in XACML PoliciesMaryem Ait El Hadj, Meryeme Ayache, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi. 548-553 [doi]
- Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring SystemNeila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim. 554-559 [doi]
- Fair and Accountable Anonymity for the Tor NetworkJesus Diaz, David Arroyo, Francisco B. Rodriguez. 560-565 [doi]
- Context-based Encryption Applied to Data Leakage Prevention SolutionsAlberto García, Alberto Garcia Moro, José Javier García, Jorge Roncero, Víctor A. Villagrá, Helena Jalain. 566-571 [doi]
- Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug BridgeJoão Amarante, João Paulo Barros. 572-577 [doi]
- Information Flows at OS Level Unmask Sophisticated Android MalwareValérie Viet Triem Tong, Aurélien Trulla, Mourad Leslous, Jean-François Lalande. 578-585 [doi]
- Privacy as a Currency: Un-regulated?Vishwas T. Patil, R. K. Shyamasundar. 586-595 [doi]