Abstract is missing.
- Sweet Dreams and Nightmares: Security in the Internet of ThingsTimo Kasper, David Oswald, Christof Paar. 1-9 [doi]
- A Security Analysis of Key Expansion Functions Using Pseudorandom PermutationsJu-Sung Kang, Nayoung Kim, Wangho Ju, Okyeon Yi. 10-23 [doi]
- Towards More Practical Time-Driven Cache AttacksRaphael Spreitzer, Benoît Gérard. 24-39 [doi]
- Orthogonal Direct Sum Masking - A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault AttacksJulien Bringer, Claude Carlet, Hervé Chabanne, Sylvain Guilley, Houssem Maghrebi. 40-56 [doi]
- New Countermeasures against Fault and Software Type Confusion Attacks on Java CardsGuillaume Barbu, Christophe Giraud. 57-75 [doi]
- A Pre-processing Composition for Secret Key Recovery on Android SmartphoneYuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake. 76-91 [doi]
- Usable Privacy for Mobile Sensing ApplicationsDelphine Christin, Franziska Engelmann, Matthias Hollick. 92-107 [doi]
- A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy ProtectionDan Bogdanov, Keita Emura, Roman Jagomägis, Akira Kanaoka, Shin'ichiro Matsuo, Jan Willemson. 108-123 [doi]
- End-to-End Secure and Privacy Preserving Mobile Chat ApplicationRaja Naeem Akram, Ryan K. L. Ko. 124-139 [doi]
- S-box, SET, Match: A Toolbox for S-box AnalysisStjepan Picek, Lejla Batina, Domagoj Jakobovic, Baris Ege, Marin Golub. 140-149 [doi]
- Policy-Based Access Control for Body Sensor NetworksCharalampos Manifavas, Konstantinos Fysarakis, Konstantinos Rantos, Konstantinos Kagiambakis, Ioannis Papaefstathiou. 150-159 [doi]
- Personal Identification in the Web Using Electronic Identity Cards and a Personal Identity ProviderAndré Zúquete, Helder Gomes, Claudio Teixeira. 160-169 [doi]
- CAN Bus Risk Analysis RevisitHafizah Mansor, Kostas F. Markantonakis, Keith Mayes. 170-179 [doi]
- AU2EU: Privacy-Preserving Matching of DNA SequencesTanya Ignatenko, Milan Petkovic. 180-189 [doi]
- Early DDoS Detection Based on Data Mining TechniquesKonstantinos Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj. 190-199 [doi]