| 2015 | A Formal Environment for MANET Organization and Security. Aida Ben Chehida Douss, Ryma Abassi, Nihel Ben Youssef, Sihem Guemara El Fatmi |
| 2015 | A Security Framework for Internet of Things. Imane Bouij-Pasquier, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort |
| 2015 | An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks. Maroua Gharam, Meriem Salhi, Noureddine Boudriga |
| 2015 | Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme. Helger Lipmaa, Kateryna Pavlyk |
| 2015 | Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals. S. Abhishek Anand, Prakash Shrestha, Nitesh Saxena |
| 2015 | Bandwidth-Optimized Secure Two-Party Computation of Minima. Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle |
| 2015 | Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings Michael K. Reiter, David Naccache |
| 2015 | On the Weaknesses of PBKDF2. Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò |
| 2015 | Outsourcing Secure Two-Party Computation as a Black Box. Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler |
| 2015 | PUDA - Privacy and Unforgeability for Data Aggregation. Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva |
| 2015 | Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation. Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada |
| 2015 | Privacy-Aware Authentication in the Internet of Things. Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer |
| 2015 | Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution. Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
| 2015 | SEPM: Efficient Partial Keyword Search on Encrypted Data. Yutaka Kawai, Takato Hirano, Yoshihiro Koseki, Tatsuji Munaka |
| 2015 | Secure Set-Based Policy Checking and Its Application to Password Registration. Changyu Dong, Franziskus Kiefer |
| 2015 | Security of Linear Secret-Sharing Schemes Against Mass Surveillance. Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci |
| 2015 | Verifiable Random Functions from (Leveled) Multilinear Maps. Bei Liang, Hongda Li, Jinyong Chang |
| 2015 | What Users Should Know About Full Disk Encryption Based on LUKS. Simone Bossi, Andrea Visconti |
| 2015 | iDeFEND: Intrusion Detection Framework for Encrypted Network Data. Fatih Kiliç, Claudia Eckert |