Malicious MPLS Policy Engine Reconnaissance Abdulrahman Almutairi and Stephen Wolthusen
Secure storage on Android with context-aware access control Faysal Boukayoua, Jorn Lapon, Bart De Decker and Vincent Naessens
USB connection vulnerabilities on Android smartphones: default and vendors’ customizations André Pereira, Manuel E. Correia and Pedro Brandão
Free typed text using keystroke dynamics for continuous authentication Paulo Pinto, Bernardo Patrão and Henrique Santos
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems Suaad Alarifi and Stephen Wolthusen
Touchpad input as a biometric identifier Alexander Chan and Tzipora Halevi
A study on Advanced Persistent Threats Ping Chen, Christophe Huygens and Lieven Desmet
An Approach to Information Security Policy Modeling for Enterprise Networks Dmitry Chernyavskiy and Natalia Miloslavskaya
D-Shuffle for Pret a Voter Dalia Khader
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption Bernd Zwattendorfer, Daniel Slamanig, Klaus Stranacher and Felix Hörandner
Attribute Based Searchable Encryption Dalia Khader
Risk Analysis of Physically Unclonable Functions Andrea Kolberger, Ingrid Schaumüller-Bichl and Martin Deutschmann
Decentralized Bootstrap for Social Overlay Networks Rodolphe Marques and André Zúquete