Abstract is missing.
- sKnock: Port-Knocking for MassesDaniel Sel, Sree Harsha Totakura, Georg Carle. 1-6 [doi]
- Toward Access Control Model for Context-Aware Services Offloaded to Cloud ComputingIchiro Satoh. 7-12 [doi]
- Comfort and Security Perception of Biometrics in Mobile Phones with Widespread SensorsJavier Guerra Casanova, Belén Ríos-Sánchez, Miguel Viana-Matesanz, Gonzalo Bailador, Carmen Sanchez-Avila, Maria Jose Melcon De Giles. 13-18 [doi]
- A Configurable Multibiometric System for Authentication at Different Security Levels Using Mobile DevicesBelén Ríos-Sánchez, Miguel Viana-Matesanz, Carmen Sanchez-Avila, Maria Jose Melcon De Giles. 19-24 [doi]
- BioALeg - Enabling Biometric Authentication in Legacy Web SitesSharareh Monfared, Daniel Andrade, Luis Rodrigues, Joao Nuno Silva. 25-30 [doi]
- SafeRegions: Performance Evaluation of Multi-party Protocols on HBaseRogerio Pontes, Francisco Maia, João Paulo, Ricardo Manuel Pereira Vilaça. 31-36 [doi]
- ARM TrustZone for Secure Image Processing on the CloudTiago Brito, Nuno O. Duarte, Nuno Santos 0001. 37-42 [doi]
- Thwarting Data Exfiltration by Repackaged ApplicationsDaniel Andrade, Thor Kristoffersen, Ivar Rummelhoff, Alex Gerdov, João Nuno Silva. 43-48 [doi]
- Emusphere: Evaluating Planetary-Scale Distributed Systems in Automated Emulation EnvironmentsJohannes Köstler, Jan Seidemann, Hans P. Reiser. 49-54 [doi]
- Have a Seat on the ErasureBench: Easy Evaluation of Erasure Coding Libraries for Distributed Storage SystemsSebastien Vaucher, Hugues Mercier, Valerio Schiavoni. 55-60 [doi]
- Adaptive IP Mutation: A Proactive Approach for Defending against Worm PropagationChang-Ting Lin, Chunming Wu, Min Huang, Zhenyu Wen, Qiumei Cheng. 61-66 [doi]
- The Convoy Effect in Atomic MulticastTarek Ahmed-Nacer, Pierre Sutra, Denis Conan. 67-72 [doi]