F. Morgner, P. Bastian, and M. , and Marc Fischlin Novel Lightweight Signcryption-Based Key Distribution Mechanisms for

K. Thuat-nguyen, N. Oualha, and M. , People: A Comparative Usability Study of Two Password Recovery Mechanisms, p.35

V. Stavova, V. Matyas, and M. , Just Secure Hardware Systems An Implementation of a High Assurance Smart Meter Using Protected Module, p.53

J. Tobias-mühlberg, S. Cleemput, M. A. Mustafa, J. Van-bulck, and .. , Bart Preneel, and Frank Piessens Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments, p.70

H. An, Based Anomaly Detection Approach for SCADA Systems, p.85

K. Stefanidis and G. Artemios, Voyiatzis Attacks to Software and Network Systems Attacking and Defending Dynamic Analysis System-Calls Based IDS

D. Couroussé, T. Barry, B. Robisson, P. J. , and .. , Olivier Potin, and Jean-Louis Lanet Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks, p.153

G. Barbu, A. Battistello, and .. , Access Control and Data Protection LAMP -Label-Based Access-Control for More Privacy in Online Social Networks, p.171

L. Bahri, B. Carminati, and .. , Elena Ferrari, and William Lucia Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data, p.187

.. Fault-channel-watermarks, 204 Peter Samarin, Alexander Skripnik, and Kerstin Lemke-Rust Short Papers The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs ? An Empirical Experiment, p.223

H. Chabanne, J. Keuffer, R. Lescuyer-password-generators, and .. , Old Ideas and New, p.245

P. Papadopoulos, E. Athanasopoulos, E. Kosta, and G. Siganos, Angelos D. Keromytis, and Evangelos P. Markatos Combining Third Party Components Securely in Automotive Systems, p.262