Hakem Beitollahi. A Ring Based Onion Circuit for Hidden Services
Károly Boda, Ádám Máté Földes, Gábor György Gulyás and Sándor Imre. User Tracking on the Web via Cross-Browser Fingerprinting
Jordi Cucurull, Simin Nadjm-Tehrani and Massimiliano Raciti. Modular anomaly detection for smartphone ad-hoc communication
Mathias Claes, Vincent Van Der Leest and An Braeken. Comparison of SRAM and D Flip-Flop PUFs in 65nm technology
Jérôme Dossogne and Frédéric Lafitte. Mental Voting Booths
Kazutomo Hamamoto, Yasuyuki Tahara and Akihiko Ohsuga. Methods for Privacy Protection Considering Status of Service Provider and User Community
Kirsi Helkala and Nils Kalstad Svendsen. Security and Memorability Analysis of Passwords Generated by Using Association Element and Personal Factor
Elahe Kani-Zabihi and Martin Helmhout. Increasing Service Users’ Privacy Awareness by Introducing On-line Interactive Privacy Features
Frédérick Lemay, Raphael Khoury and Nadia Tawbi. Optimized Inlining of Runtime Monitors
Radu Lupu, Eugen Borcoci and Tinku Rasheed. Identity-based Key Derivation Method for Low Delay Inter-domain Handover Re-authentication Service
Veelasha Moonsamy, Ronghua Tian and Lynn Batten. Feature Reduction to speed up Malware Classification
Assem Nazar, Mark M. Seeger and Harald Baier. Rooting Android — Extending the ADB by an Auto-Connecting WiFi-Accessible Root Service
Jaydip Sen and Subhamoy Maitra. An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks
Deian Stefan, David Mazieres, John Mitchell and Alejandro Russo. Disjunction Category Labels
Inger Anne Tøndel. Visualization Control for Event-Based Public Display Systems used in a Hospital Setting
Erich Wenger and Michael Hutter. Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations
Monika Desoi, Matthias Pocs and Benjamin Stach. The “Three-Step-Model” – Legally Compatible Design of Future Biometric Systems for Crime Prevention
Ashar Javed. CSP AiDer: An Automated Recommendation of Content Security Policy for Web Applications
Kristjan Valur Jonsson and Ymir Vigfusson. Securing Distributed Aggregation with Trusted Devices
Audun Jøsang and Kashif Sana Dar. Server Certificates based on DNSSEC
Dalia Khader, Ben Smyth, Peter Ryan and Feng Hao. A Fair and Robust Voting System by Broadcast
Igor Kotenko, Alexey Konovalov and Andrey Shorov. Simulation of botnets and protection mechanisms against them: software environment and experiments
Hanno Langweg. Comparison of Malware Protection of Electronic Signature Applications
Benedikt Westermann, Lars Fischer, Vinh Pham and Dogan Kesdogan. 50 Bucks Attack on Tor