Abstract is missing.
- A pilot study on the security of pattern screen-lock methods and soft side channel attacksPanagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Can Yildiz. 1-6 [doi]
- Who do you sync you are?: smartphone fingerprinting via application behaviourTim Stöber, Mario Frank, Jens B. Schmitt, Ivan Martinovic. 7-12 [doi]
- MAST: triage for market-scale mobile malware analysisSaurabh Chakradeo, Bradley Reaves, Patrick Traynor, William Enck. 13-24 [doi]
- Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gesturesHaoyu Li, Di Ma, Nitesh Saxena, Babins Shrestha, Yan Zhu. 25-30 [doi]
- Counter-jamming using mixed mechanical and software interference cancellationTriet Vo Huu, Erik-Oliver Blass, Guevara Noubir. 31-42 [doi]
- Detection of reactive jamming in DSSS-based wireless networksDomenico Giustiniano, Vincent Lenders, Jens B. Schmitt, Michael Spuhler, Matthias Wilhelm. 43-48 [doi]
- Selfish manipulation of cooperative cellular communications via channel fabricationShrikant Adhikarla, Min-Suk Kang, Patrick Tague. 49-54 [doi]
- 6LoWPAN fragmentation attacks and mitigation mechanismsRené Hummen, Jens Hiller, Hanno Wirtz, Martin Henze, Hossein Shafagh, Klaus Wehrle. 55-66 [doi]
- ETA: efficient and tiny and authentication for heterogeneous wireless systemsAttila Altay Yavuz. 67-72 [doi]
- GPS+: a back-end coupons identification for low-cost RFIDEthmane El Moustaine, Maryline Laurent. 73-78 [doi]
- The weakness of integrity protection for LTETeng Wu, Guang Gong. 79-88 [doi]
- Perfect contextual information privacy in WSNs undercolluding eavesdroppersAlejandro Proaño, Loukas Lazos. 89-94 [doi]
- SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about itBenjamin Henne, Christian Szongott, Matthew Smith. 95-106 [doi]
- Differential privacy in intelligent transportation systemsFrank Kargl, Arik Friedman, Roksana Boreli. 107-112 [doi]
- Private proximity testing with an untrusted serverGökay Saldamli, Richard Chow, Hongxia Jin, Bart P. Knijnenburg. 113-118 [doi]
- Securing the IP-based internet of things with HIP and DTLSOscar García Morchon, Sye Loong Keoh, Sandeep S. Kumar, Pedro Moreno-Sanchez, Francisco Vidal-Meca, Jan Henrik Ziegeldorf. 119-124 [doi]
- Revisiting lightweight authentication protocols based on hard learning problemsPanagiotis Rizomiliotis, Stefanos Gritzalis. 125-130 [doi]
- SeDyA: secure dynamic aggregation in VANETsRens Wouter van der Heijden, Stefan Dietzel, Frank Kargl. 131-142 [doi]
- Adversarial testing of wireless routing implementationsMd. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles Edwin Killian, Cristina Nita-Rotaru. 143-148 [doi]
- Entropy harvesting from physical sensorsChristine Hennebert, Hicham Hossayni, Cédric Lauradoux. 149-154 [doi]
- ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networksLu Shi, Jiawei Yuan, Shucheng Yu, Ming Li. 155-166 [doi]
- Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channelYantian Hou, Ming Li, Joshua D. Guttman. 167-178 [doi]
- Countermeasures against sybil attacks in WSN based on proofs-of-workMarek Klonowski, Michal Koza. 179-184 [doi]
- Energy attacks and defense techniques for wireless systemsSheng Wei, Jong Hoon Ahnn, Miodrag Potkonjak. 185-194 [doi]
- Subtle kinks in distance-bounding: an analysis of prominent protocolsMarc Fischlin, Cristina Onete. 195-206 [doi]
- Efficient, secure, private distance bounding without key updatesJens Hermans, Roel Peeters, Cristina Onete. 207-218 [doi]