Accepted Papers
Accepted Full Papers (23)
- Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks
- CLKS: Certificateless Keyword Search over Encrypted Data
- Indicators of Malicious SSL Connections
- A New Statistical Approach For Integral Attack
- Managing Multi-dimensional Multi-granular Security Policies using Data Warehousing
- Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks
- Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control
- An Efficient Leveled Identity-Based FHE
- Isolation of Multiple Anonymous Attackers in Mobile Networks
- RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory
- Service in denial - clouds going with the winds
- A framework for policy similarity evaluation and migration based on change detection
- Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs
- No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position
- Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
- Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach
- Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing
- GP-ORAM: A Generalized Partition ORAM
- Anonymous Evaluation System
- Android Botnets: What URLs are telling us
- MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust
- Evolving Highly Nonlinear Balanced Boolean Functions with Optimal Resistance to DPA Attacks
- DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices
Accepted Short Papers (18)
- Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection
- Detecting Malicious Temporal Alterations of ECG signals in Body Sensor Networks
- Electronic Contract Signing without Using Trusted Third Party
- A Game Theoretic Framework for Cloud Security Transparency
- Cryptographically Secure On-Chip Firewalling
- Detecting malicious activity on smartphones using sensor measurements
- Assessing Attack Surface with Component-based Package Dependency
- VICI: Visual Caller Identification for Contact Center Applications
- De-anonymizable Location Cloaking for Privacy-controlled Mobile Systems
- Let's Get Mobile: Secure FOTA for Automotive Systems
- Performance Analysis of Real-Time Covert Timing Channel Detection using a Parallel System
- Two New Message Authentication Codes Based on APN Functions and Stream Ciphers
- An Abstraction for the Interoperability Analysis of Security Policies
- A Scalable and Efficient Multiparty Private Set Intersection
- First-Priority Relation Graph-based Malicious Users Detection in Mobile Social Networks
- A Study of Network Domains Used in Android Applications
- Foundations of Optical Encryption: A Candidate Short-key Scheme
-
From Pretty Good To Great: Enhancing PGP using Bitcoin and the Blockchain