| 2016 | 3-Out-of-n Cheating Prevention Visual Cryptographic Schemes. Ching-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai |
| 2016 | A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security. Edwin T. L. Rampine, Cynthia H. Ngejane |
| 2016 | A Collaborative Analysis System for Cross-organization Cyber Incident Handling. Giuseppe Settanni, Florian Skopik, Yegor Shovgenya, Roman Fiedler |
| 2016 | A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost Estimate. Masahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa |
| 2016 | A Continuous LoA Compliant Trust Evaluation Method. Julien Hatin, Estelle Cherrier, Jean-Jacques Schwartzmann, Vincent Frey, Christophe Rosenberger |
| 2016 | A Cyberthreat Search Process and Service. Yogesh Bhanu, Sebastian Dännart, Henning von Kielpinski, Alexander Laux, Ulrike Lechner, Tobias Lehmann, Andreas Rieb, Martin Riedl, Florian Wolf |
| 2016 | A New Approach for Electronic Signature. Gianluca Lax, Francesco Buccafurri, Serena Nicolazzo, Antonino Nocera, Lidia Fotia |
| 2016 | A Practical-time Attack on Reduced-round MISTY1. Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi |
| 2016 | A Pragmatic System-failure Assessment and Response Model. Jassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese |
| 2016 | A Privacy Threat for Internet Users in Internet-censoring Countries. Feno Heriniaina R. |
| 2016 | A Quantitative Methodology for Security Risk Assessment of Enterprise Business Processes. Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar |
| 2016 | A Statistical Approach to the Detection of HTML Attribute Permutation Steganography. Iman Sedeeq, Frans Coenen, Alexei Lisitsa |
| 2016 | A Threat Analysis Model for Identity and Access Management. Nadia Jemil Abdu, Ulrike Lechner |
| 2016 | An Anonymous Geocast Scheme for ITS Applications. Carsten Büttner, Sorin A. Huss |
| 2016 | An Approach to Personalized Privacy Policy Recommendations on Online Social Networks. Ammar Abuelgasim, Anne V. D. M. Kayem |
| 2016 | An Expert System for Facilitating an Institutional Risk Profile Definition for Cyber Situational Awareness. Roman Graf, Sergiu Gordea, Heather M. Ryan, Tibaut Houzanme |
| 2016 | An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications. Germain Jolly, Sylvain Vernois, Christophe Rosenberger |
| 2016 | Analysis of ISO 27001: 2013 Controls Effectiveness for Cloud Computing. Muhammad Imran Tariq, Vito Santarcangelo |
| 2016 | Anomaly-based Mobile Malware Detection: System Calls as Source for Features. Dominik Teubert, Fred Grossmann, Ulrike Meyer |
| 2016 | Characterization of Encrypted and VPN Traffic using Time-related Features. Gerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, Ali A. Ghorbani |
| 2016 | Characterizing SEAndroid Policies in the Wild. Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan |
| 2016 | Collaborative Information Service - Privacy Algebra for User Defined Security. Asim K. Pal, Subrata Bose, Arpita Maitra |
| 2016 | Collateral Damage of Online Social Network Applications. Iraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel |
| 2016 | Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for Healthcare. Ana Ferreira, Gabriele Lenzini |
| 2016 | Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post Processing. Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer |
| 2016 | DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service. Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu |
| 2016 | Declassification of Information with Complex Filter Functions. Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif |
| 2016 | Detecting Botnets using a Collaborative Situational-aware IDPS. M. Lisa Mathews, Anupam Joshi, Tim Finin |
| 2016 | Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques. Kexin Qiao, Lei Hu, Siwei Sun |
| 2016 | Efficient Authorization Authority Certificate Distribution in VANETs. Sebastian Bittl, Karsten Roscher |
| 2016 | Ethics in Security Research. Edgar R. Weippl |
| 2016 | Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study. Gencer Erdogan, Ketil Stølen, Jan Øyvind Aagedal |
| 2016 | Experimental Evaluation of Password Recovery in Encrypted Documents. Radek Hranicky, Petr Matousek, Ondrej Rysavý, Vladimír Veselý |
| 2016 | Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids. Anesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen |
| 2016 | Handwritten Signature Verification for Mobile Phones. Nilakantha Paudel, Marco Querini, Giuseppe F. Italiano |
| 2016 | High-Performance FPGA Implementation of Elliptic Curve Cryptography Processor over Binary Field GF(2^163). Md. Selim Hossain, Ehsan Saeedi, Yinan Kong |
| 2016 | IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation. Rafiullah Khan, Kieran McLaughlin, David M. Laverty, Sakir Sezer |
| 2016 | Identification of Android Malware Families with Model Checking. Pasquale Battista, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio |
| 2016 | Improving Database Security in Web-based Environments. Francesco Di Tria, Ezio Lefons, Filippo Tangorra |
| 2016 | Injecting CSP for Fun and Security. Christoph Kerschbaumer, Sid Stamm, Stefan Brunthaler |
| 2016 | Interaction-based Reputation Model in Online Social Networks. Izzat Alsmadi, Dianxiang Xu, Jin-Hee Cho |
| 2016 | Internet Streaming and Network Neutrality: Comparing the Performance of Video Hosting Services. Alessio Botta, Aniello Avallone, Mauro Garofalo, Giorgio Ventre |
| 2016 | Lightweight Trust Model with High Longevity for Wireless Sensor Networks. Hela Maddar, Wafa Kammoun, Omar Cheikhrouhou, Habib Youssef |
| 2016 | Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN. Danping Shi, Lei Hu, Siwei Sun, Ling Song |
| 2016 | Mitigating Local Attacks Against a City Traffic Controller. Nils Ulltveit-Moe, Steffen Pfrang, László Erdödi, Héctor Nebot |
| 2016 | Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction. Peter Maynard, Kieran McLaughlin, Sakir Sezer |
| 2016 | Multi-factor Authentication Updating System Evaluation Dynamically for Service Continuity. Hiroya Susuki, Rie Shigetomi Yamaguchi, Shizuo Sakamoto |
| 2016 | On TLS 1.3 - Early Performance Analysis in the IoT Field. Simone Bossi, Tea Anselmo, Guido Bertoni |
| 2016 | Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin Processors. Cristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus |
| 2016 | Personalised Privacy by Default Preferences - Experiment and Analysis. Toru Nakamura, Shinsaku Kiyomoto, Welderufael B. Tesfay, Jetzabel M. Serna |
| 2016 | Predicting Attack Prone Software Components using Repository Mined Change Metrics. Daniel D. Hein, Hossein Saiedian |
| 2016 | Privacy, Ethics and Big Data. Jason I. Hong |
| 2016 | Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016. Olivier Camp, Steven Furnell, Paolo Mori |
| 2016 | Quantitative Evaluation of Security on Cryptographic ICs against Fault Injection Attacks. C. Shao, H. Li, G. Xu |
| 2016 | Retrospective Study of Third-party Web Tracking. Tim Wambach, Katharina Bräunlich |
| 2016 | Review Analysis of Properties for an Ideal Secure Biometric Template Scheme. Phiwa Mzila |
| 2016 | Risk Management for Dynamic Metadata Exchange via a Trusted Third Party. Daniela Pöhn |
| 2016 | Security and Privacy Practices in Healthcare Information Systems: A Cluster Analysis of European Hospitals. Sylvestre Uwizeyemungu, Placide Poba-Nzaou |
| 2016 | Sift - An Efficient Method for Co-residency Detection on Amazon EC2. Kang Chen, Qingni Shen, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu |
| 2016 | Streamlining Extraction and Analysis of Android RAM Images. Simon Broenner, Hans Höfken, Marko Schuba |
| 2016 | Tax Fraud and Investigation Procedures - Everybody, Every Where, Every Time. Hans-Joachim Lenz |
| 2016 | The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition Technologies. Marius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi |
| 2016 | Tracking Explicit and Control Flows in Java and Native Android Apps Code. Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet |
| 2016 | Truncated, Impossible, and Improbable Differential Analysis of ASCON. Cihangir Tezcan |
| 2016 | Trust-based Dynamic RBAC. Tamir Lavi, Ehud Gudes |
| 2016 | Understanding the Impact of Cyber Security Risks on Safety. Christine Izuakor |
| 2016 | Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine. Cong Li, Qingni Shen, Kang Chen, Yahui Yang, Zhonghai Wu |