| 2015 | A Framework for Policy Similarity Evaluation and Migration Based on Change Detection. Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi |
| 2015 | A Game Theoretic Framework for Cloud Security Transparency. Abdulaziz Aldribi, Issa Traoré |
| 2015 | A New Statistical Approach for Integral Attack. Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao |
| 2015 | A Scalable Multiparty Private Set Intersection. Atsuko Miyaji, Shohei Nishida |
| 2015 | A Study of Network Domains Used in Android Applications. Mark E. Fioravanti II, Ayush Shah, Shengzhi Zhang |
| 2015 | An Abstraction for the Interoperability Analysis of Security Policies. Javier Baliosian, Ana R. Cavalli |
| 2015 | An Efficient Leveled Identity-Based FHE. Fuqun Wang, Kunpeng Wang, Bao Li |
| 2015 | Android Botnets: What URLs are Telling Us. Andi Fitriah Abdul Kadir, Natalia Stakhanova, Ali Akbar Ghorbani |
| 2015 | Anonymous Evaluation System. Kamil Kluczniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski |
| 2015 | Assessing Attack Surface with Component-Based Package Dependency. Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, Jing Jin |
| 2015 | CLKS: Certificateless Keyword Search on Encrypted Data. Qingji Zheng, Xiangxue Li, Aytac Azgin |
| 2015 | Compartmentation Policies for Android Apps: A Combinatorial Optimization Approach. Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez |
| 2015 | Cryptographically Secure On-Chip Firewalling. Jean-Michel Cioranesco, Craig Hampel, Guilherme Ozari de Almeida, Rodrigo Portella do Canto |
| 2015 | Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks. Wei Wang, Mikhail Istomin, Jeffrey Bickford |
| 2015 | De-anonymizable Location Cloaking for Privacy-Controlled Mobile Systems. Chao Li, Balaji Palanisamy |
| 2015 | Detecting Malicious Activity on Smartphones Using Sensor Measurements. Roger Piqueras Jover, Ilona Murynets, Jeffrey Bickford |
| 2015 | Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks. Hang Cai, Krishna K. Venkatasubramanian |
| 2015 | DisARM: Mitigating Buffer Overflow Attacks on Embedded Devices. Javid Habibi, Ajay Panicker, Aditi Gupta, Elisa Bertino |
| 2015 | Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks. Jongho Won, Elisa Bertino |
| 2015 | Electronic Contract Signing Without Using Trusted Third Party. Zhiguo Wan, Robert H. Deng, David Lee |
| 2015 | Enforcing Privacy in Distributed Multi-Domain Network Anomaly Detection. Christian Callegari, Stefano Giordano, Michele Pagano |
| 2015 | Evolving Highly Nonlinear Balanced Boolean Functions with Improved Resistance to DPA Attacks. Ashish Jain, Narendra S. Chaudhari |
| 2015 | First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks. Li Xu, Limei Lin, Sheng Wen |
| 2015 | Foundations of Optical Encryption: A Candidate Short-Key Scheme. Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad |
| 2015 | From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain. Duane Wilson, Giuseppe Ateniese |
| 2015 | GP-ORAM: A Generalized Partition ORAM. Jinsheng Zhang, Wensheng Zhang, Daji Qiao |
| 2015 | Indicators of Malicious SSL Connections. Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Damiano Bolzoni |
| 2015 | Isolation of Multiple Anonymous Attackers in Mobile Networks. Brian Ricks, Patrick Tague |
| 2015 | Let's Get Mobile: Secure FOTA for Automotive System. Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes |
| 2015 | MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust. Navid Pustchi, Ravi S. Sandhu |
| 2015 | Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing. Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub |
| 2015 | Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing. Jinwei Xu, Jiankun Hu |
| 2015 | Network and System Security - 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings Meikang Qiu, Shouhuai Xu, Moti Yung, Haibo Zhang |
| 2015 | New Message Authentication Code Based on APN Functions and Stream Ciphers. Teng Wu, Guang Gong |
| 2015 | No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani |
| 2015 | Performance Analysis of Real-Time Covert Timing Channel Detection Using a Parallel System. Ross K. Gegan, Rennie Archibald, Matthew K. Farrens, Dipak Ghosal |
| 2015 | Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher. Xiaoshuang Ma, Kexin Qiao |
| 2015 | RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memory. Weizhi Meng |
| 2015 | Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control. Hui Ma, Rui Zhang |
| 2015 | Service in Denial - Clouds Going with the Winds. Vit Bukac, Vlasta Stavova, Lukas Nemec, Zdenek Ríha, Vashek Matyas |
| 2015 | Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs. Devu Manikantan Shila, Vivek Venugopalan, Cameron D. Patterson |
| 2015 | VICI: Visual Caller Identification for Contact Center Applications. P. Krishnan, Navjot Singh |