Abstract is missing.
- Securing Transactions with the eIDAS ProtocolsFrank Morgner, Paul Bastian, Marc Fischlin. 3-18 [doi]
- Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEYKim Thuat Nguyen, Nouha Oualha, Maryline Laurent. 19-34 [doi]
- Codes v. People: A Comparative Usability Study of Two Password Recovery MechanismsVlasta Stavova, Vashek Matyas, Mike Just. 35-50 [doi]
- An Implementation of a High Assurance Smart Meter Using Protected Module ArchitecturesJan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens. 53-69 [doi]
- Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing EnvironmentsVassilios Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis. 70-84 [doi]
- An HMM-Based Anomaly Detection Approach for SCADA SystemsKyriakos Stefanidis, Artemios G. Voyiatzis. 85-99 [doi]
- Attacking and Defending Dynamic Analysis System-Calls Based IDSIshai Rosenberg, Ehud Gudes. 103-119 [doi]
- Towards Automatic Risk Analysis and Mitigation of Software ApplicationsLeonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy. 120-135 [doi]
- Runtime Code Polymorphism as a Protection Against Side Channel AttacksDamien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet. 136-152 [doi]
- Analysis of a Code-Based Countermeasure Against Side-Channel and Fault AttacksGuillaume Barbu, Alberto Battistello. 153-168 [doi]
- LAMP - Label-Based Access-Control for More Privacy in Online Social NetworksLeila Bahri, Barbara Carminati, Elena Ferrari, William Lucia. 171-186 [doi]
- Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned DataLing Chen, Ting Yu, Rada Chirkova. 187-203 [doi]
- Fault-Channel WatermarksPeter Samarin, Alexander Skripnik, Kerstin Lemke-Rust. 204-219 [doi]
- The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical ExperimentAhmad Sabouri. 223-235 [doi]
- Delegating Biometric Authentication with the Sumcheck ProtocolHervé Chabanne, Julien Keuffer, Roch Lescuyer. 236-244 [doi]
- Password Generators: Old Ideas and NewFatma Al Maqbali, Chris J. Mitchell. 245-253 [doi]
- Provable Network Activity for Protecting Users Against False AccusationPanagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos. 254-261 [doi]
- Combining Third Party Components Securely in Automotive SystemsMadeline Cheah, Siraj A. Shaikh, Jeremy Bryans, Hoang Nga Nguyen. 262-269 [doi]