Abstract is missing.
- Can Nature Help Us Solve Risk Management Issues?William H. Saito. 1-5 [doi]
- Quantitative Analysis of the Full Bitcoin Transaction GraphDorit Ron, Adi Shamir. 6-24 [doi]
- Beware the Middleman: Empirical Analysis of Bitcoin-Exchange RiskTyler Moore, Nicolas Christin. 25-33 [doi]
- Evaluating User Privacy in BitcoinElli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun. 34-51 [doi]
- The Importance of Being Earnest [In Security Warnings]Serge Egelman, Stuart E. Schechter. 52-59 [doi]
- Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device PairingAlexander Gallego, Nitesh Saxena, Jonathan Voris. 60-68 [doi]
- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity AuthenticationTiffany Hyun-Jin Kim, Akira Yamada, Virgil D. Gligor, Jason I. Hong, Adrian Perrig. 69-77 [doi]
- Practical Fully Simulatable Oblivious Transfer with Sublinear CommunicationBingsheng Zhang, Helger Lipmaa, Cong Wang, Kui Ren. 78-95 [doi]
- Unconditionally-Secure Robust Secret Sharing with Minimum Share SizeMahabir Prasad Jhanwar, Reihaneh Safavi-Naini. 96-110 [doi]
- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series DataMarc Joye, Benoît Libert. 111-125 [doi]
- "Give Me Letters 2, 3 and 6!": Partial Password Implementations and AttacksDavid Aspinall, Mike Just. 126-143 [doi]
- Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password ManagersSascha Fahl, Marian Harbach, Marten Oltrogge, Thomas Muders, Matthew Smith. 144-161 [doi]
- Unique Ring Signatures: A Practical ConstructionMatthew K. Franklin, Haibin Zhang. 162-170 [doi]
- Aggregating CL-Signatures Revisited: Extended Functionality and Better EfficiencyKwangsu Lee, Dong-Hoon Lee, Moti Yung. 171-188 [doi]
- Accumulators and U-Prove RevocationTolga Acar, Sherman S. M. Chow, Lan Nguyen. 189-196 [doi]
- Towards a Publicly-Verifiable Mix-Net Providing Everlasting PrivacyJohannes Buchmann, Denise Demirel, Jeroen van de Graaf. 197-204 [doi]
- P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation SystemsAndy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Christof Paar. 205-212 [doi]
- Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault InjectionsYu Sasaki, Yang Li, Hikaru Sakamoto, Kazuo Sakiyama. 213-220 [doi]
- Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility StudyJonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, Koen De Bosschere. 221-229 [doi]
- On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM CardsYuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater. 230-238 [doi]
- Securely Solving Simple Combinatorial Graph ProblemsAbdelrahaman Aly, Edouard Cuvelier, Sophie Mawet, Olivier Pereira, Mathieu Van Vyve. 239-257 [doi]
- Parallel and Dynamic Searchable Symmetric EncryptionSeny Kamara, Charalampos Papamanthou. 258-274 [doi]
- GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth CircuitsThomas Schneider 0003, Michael Zohner. 275-292 [doi]
- The Untapped Potential of Trusted Execution Environments on Mobile DevicesN. Asokan, Jan-Erik Ekberg, Kari Kostiainen. 293-294 [doi]
- Stark - Tamperproof Authentication to Resist KeyloggingTilo Müller, Hans Spath, Richard Mäckl, Felix C. Freiling. 295-312 [doi]
- Risks of Offline Verify PIN on Contactless CardsMartin Emms, Budi Arief, Nicholas Little, Aad P. A. van Moorsel. 313-321 [doi]
- How to Attack Two-Factor Authentication Internet BankingManal Adham, Amir Azodi, Yvo Desmedt, Ioannis Karaolis. 322-328 [doi]
- CAge: Taming Certificate Authorities by Inferring Restricted ScopesJames Kasten, Eric Wustrow, J. Alex Halderman. 329-337 [doi]
- Interdependent Privacy: Let Me Share Your DataGergely Biczók, Pern Hui Chia. 338-353 [doi]
- A Secure Submission System for Online Whistleblowing PlatformsVolker Roth, Benjamin Güldenring, Eleanor G. Rieffel, Sven Dietrich, Lars Ries. 354-361 [doi]
- Securing Anonymous Communication Channels under the Selective DoS AttackAnupam Das, Nikita Borisov. 362-370 [doi]
- PIRMAP: Efficient Private Information Retrieval for MapReduceTravis Mayberry, Erik-Oliver Blass, Agnes Hui Chan. 371-385 [doi]
- Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security UpdatesJustin Cappos. 386-394 [doi]
- Three-Factor User Authentication Method Using Biometrics Challenge ResponseHaruhiko Fujii, Yukio Tsuruoka. 395-396 [doi]
- Synthetic Logs Generator for Fraud Detection in Mobile Transfer ServicesChrystel Gaber, Baptiste Hemery, Mohammed Achemlal, Marc Pasquet, Pascal Urien. 397-398 [doi]
- Onions for Sale: Putting Privacy on the MarketAaron Johnson, Rob Jansen, Paul F. Syverson. 399-400 [doi]
- Searchable Encryption Supporting General Boolean Expression QueriesTarik Moataz, Abdullatif Shikfa. 401 [doi]
- A Privacy Preserving E-Payment ArchitectureAude Plateaux, Vincent Coquet, Sylvain Vernois, Patrick Lacharme, Kumar Murty, Christophe Rosenberger. 402 [doi]
- Communication Services Empowered with a Classical Chaos Based CryptosystemGerard Vidal, Mikel Hernaez. 403 [doi]