Accepted Papers


  • Accepted Full Papers (23)

    • Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks

    • CLKS: Certificateless Keyword Search over Encrypted Data

    • Indicators of Malicious SSL Connections

    • A New Statistical Approach For Integral Attack

    • Managing Multi-dimensional Multi-granular Security Policies using Data Warehousing

    • Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks

    • Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control

    • An Efficient Leveled Identity-Based FHE

    • Isolation of Multiple Anonymous Attackers in Mobile Networks

    • RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory

    • Service in denial - clouds going with the winds

    • A framework for policy similarity evaluation and migration based on change detection

    • Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs

    • No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position

    • Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher

    • Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach

    • Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing

    • GP-ORAM: A Generalized Partition ORAM

    • Anonymous Evaluation System

    • Android Botnets: What URLs are telling us

    • MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust

    • Evolving Highly Nonlinear Balanced Boolean Functions with Optimal Resistance to DPA Attacks

    • DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices

  • Accepted Short Papers (18)

    • Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection

    • Detecting Malicious Temporal Alterations of ECG signals in Body Sensor Networks

    • Electronic Contract Signing without Using Trusted Third Party

    • A Game Theoretic Framework for Cloud Security Transparency

    • Cryptographically Secure On-Chip Firewalling

    • Detecting malicious activity on smartphones using sensor measurements

    • Assessing Attack Surface with Component-based Package Dependency

    • VICI: Visual Caller Identification for Contact Center Applications

    • De-anonymizable Location Cloaking for Privacy-controlled Mobile Systems

    • Let's Get Mobile: Secure FOTA for Automotive Systems

    • Performance Analysis of Real-Time Covert Timing Channel Detection using a Parallel System

    • Two New Message Authentication Codes Based on APN Functions and Stream Ciphers

    • An Abstraction for the Interoperability Analysis of Security Policies

    • A Scalable and Efficient Multiparty Private Set Intersection

    • First-Priority Relation Graph-based Malicious Users Detection in Mobile Social Networks

    • A Study of Network Domains Used in Android Applications

    • Foundations of Optical Encryption: A Candidate Short-key Scheme

    • From Pretty Good To Great: Enhancing PGP using Bitcoin and the Blockchain