Abstract is missing.
- Recent Developments in Low-Level Software SecurityPieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, Frank Piessens. 1-16 [doi]
- Towards a C2I Platform for Combating the Cyber-ThreatPaul Kearney. 17-19 [doi]
- Veracity, Plausibility, and ReputationDieter Gollmann. 20-28 [doi]
- Another Fallen Hash-Based RFID Authentication ProtocolJulio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi. 29-37 [doi]
- HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural NetworkG. Kirubavathi Venkatesh, R. Anitha Nadarajan. 38-48 [doi]
- How to Break EAP-MD5Fanbao Liu, Tao Xie. 49-57 [doi]
- Privacy Preserving Social Network Publication on Bipartite GraphsJian Zhou, Jiwu Jing, Ji Xiang, Lei Wang. 58-70 [doi]
- Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing ApplicationsDelphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer. 71-86 [doi]
- Privacy Preservation of User History GraphShinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake. 87-96 [doi]
- HiPoLDS: A Security Policy Language for Distributed SystemsMatteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier. 97-112 [doi]
- ROAC: A Role-Oriented Access Control ModelNezar Nassr, Eric Steegmans. 113-127 [doi]
- Optimal Parameters for Efficient Two-Party Computation ProtocolsChaya Ganesh, C. Pandu Rangan. 128-143 [doi]
- Assisting Server for Secure Multi-Party ComputationJens-Matthias Bohli, Wenting Li, Jan Seedorf. 144-159 [doi]
- An Efficient Lattice-Based Secret Sharing ConstructionRachid El Bansarkhani, Mohammed Meziani. 160-168 [doi]
- On the Optimality of Correlation Power Attack on Embedded Cryptographic SystemsYoussef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger. 169-178 [doi]
- Impossible Differential Cryptanalysis of Reduced-Round LBlockFerhat Karakoç, Hüseyin Demirci, A. Emre Harmanci. 179-188 [doi]
- Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile DevicesJohann Großschädl, Dan Page, Stefan Tillich. 189-207 [doi]
- Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for AndroidDaniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff. 208-223 [doi]