Abstract is missing.
- Towards a Personal Security DeviceChristof Rath, Thomas Niedermair, Thomas Zefferer. 1-16 [doi]
- Retrofitting Mutual Authentication to GSM Using RAND HijackingMohammed Shafiul Alam Khan, Chris J. Mitchell. 17-31 [doi]
- DAPA: Degradation-Aware Privacy Analysis of Android AppsGianluca Barbon, Agostino Cortesi, Pietro Ferrara, Enrico Steffinlongo. 32-46 [doi]
- Access Control Enforcement for Selective Disclosure of Linked DataTarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid. 47-63 [doi]
- Enforcement of U-XACML History-Based Usage Control PolicyFabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino. 64-81 [doi]
- Access Control for Weakly Consistent Replicated Information SystemsMathias Weber 0001, Annette Bieniusa, Arnd Poetzsch-Heffter. 82-97 [doi]
- Privacy-Aware Trust NegotiationRuben Rios, M. Carmen Fernández Gago, Javier Lopez. 98-105 [doi]
- Securely Derived Identity Credentials on Smart Phones via Self-enrolmentFabian van den Broek, Brinda Hampiholi, Bart Jacobs 0001. 106-121 [doi]
- Distributed Immutabilization of Secure LogsJordi Cucurull, Jordi Puiggali. 122-137 [doi]
- A Stochastic Framework for Quantitative Analysis of Attack-Defense TreesRavi Jhawar, Karim Lounis, Sjouke Mauw. 138-153 [doi]
- Information Security as Strategic (In)effectivityWojciech Jamroga, Masoud Tabatabaei. 154-169 [doi]
- Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical SystemsGabriele Lenzini, Sjouke Mauw, Samir Ouchani. 170-178 [doi]
- Formal Analysis of Vulnerabilities of Web Applications Based on SQL InjectionFederico De Meo, Marco Rocchetto, Luca Viganò 0001. 179-195 [doi]
- MalloryWorker: Stealthy Computation and Covert Channels Using Web WorkersMichael Rushanan, David Russell, Aviel D. Rubin. 196-211 [doi]
- PSHAPE: Automatically Combining Gadgets for Arbitrary Method ExecutionAndreas Follner, Alexandre Bartel, Hui Peng, Yu-Chen Chang, Kyriakos K. Ispoglou, Mathias Payer, Eric Bodden. 212-228 [doi]