and Marc Fischlin Novel Lightweight Signcryption-Based Key Distribution Mechanisms for ,
People: A Comparative Usability Study of Two Password Recovery Mechanisms, p.35 ,
Just Secure Hardware Systems An Implementation of a High Assurance Smart Meter Using Protected Module, p.53 ,
Bart Preneel, and Frank Piessens Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments, p.70 ,
Based Anomaly Detection Approach for SCADA Systems, p.85 ,
Voyiatzis Attacks to Software and Network Systems Attacking and Defending Dynamic Analysis System-Calls Based IDS ,
Olivier Potin, and Jean-Louis Lanet Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks, p.153 ,
Access Control and Data Protection LAMP -Label-Based Access-Control for More Privacy in Online Social Networks, p.171 ,
Elena Ferrari, and William Lucia Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data, p.187 ,
204 Peter Samarin, Alexander Skripnik, and Kerstin Lemke-Rust Short Papers The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs ? An Empirical Experiment, p.223 ,
Old Ideas and New, p.245 ,
Angelos D. Keromytis, and Evangelos P. Markatos Combining Third Party Components Securely in Automotive Systems, p.262 ,