| 2014 | A Cryptographic Study of Tokenization Systems. Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez, Debrup Chakraborty |
| 2014 | A Formal Model for Forensic Storage Media Preparation Tools. Benjamin Aziz, Philippe Massonet, Christophe Ponsard |
| 2014 | A Hybrid Approach for Content Based Image Authentication. Jinse Shin, Christoph Ruland |
| 2014 | A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques. Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake |
| 2014 | A Need-based Assessment for Building a National Cyber Security Workforce. Seymour E. Goodman |
| 2014 | A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme. Francesco Buccafurri, Gianluca Lax |
| 2014 | A Secure Anonymous Proxy Multi-signature Scheme. Vishal Saraswat, Rajeev Anand Sahu |
| 2014 | A Steganographic Protocol Based on Linear Error-Block Codes. Rabiî Dariti, El Mamoun Souidi |
| 2014 | Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction. Vandana Guleria, Ratna Dutta |
| 2014 | Advanced Persistent Threats & Social Engineering. Edgar R. Weippl |
| 2014 | An Efficient Lightweight Security Algorithm for Random Linear Network Coding. Hassan Noura, Steven Martin, Khaldoun Al Agha |
| 2014 | COGITO: Code Polymorphism to Secure Devices. Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon, Philippe Lalevée |
| 2014 | Certificateless Non-Interactive Key Exchange Protocol without Pairings. Yun Wei, Fushan Wei, Chuangui Ma |
| 2014 | CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds. Nesrine Kaaniche, Maryline Laurent, Mohammed El-Barbori |
| 2014 | Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon. Nicolas T. Courtois, Theodosis Mourouzis, Guangyan Song, Pouyan Sepehrdad, Petr Susil |
| 2014 | Constructing Empirical Tests of Randomness. Marek Sýs, Petr Svenda, Martin Ukrop, Vashek Matyas |
| 2014 | Could Bitcoin Transactions Be 100x Faster?. Nicolas T. Courtois, Pinar Emirdag, Daniel A. Nagy |
| 2014 | Democratization in Science and Technology through Cloud Computing. Ivona Brandic |
| 2014 | Differential Fault Attacks against AES Tampering with the Instruction Flow. Silvia Mella, Filippo Melzani, Andrea Visconti |
| 2014 | Dynamic Analysis of Usage Control Policies. Yehia Elrakaiby, Jun Pang |
| 2014 | Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions. Sebastian Bittl |
| 2014 | Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine. Adriana-Cristina Enache, Valentin Sgarciu |
| 2014 | Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal. Amir I. Sulimov, Alexey D. Smolyakov, Arkadij V. Karpov, Oleg N. Sherstyukov |
| 2014 | FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments. Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini |
| 2014 | Formal Analysis of Electronic Exams. Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan |
| 2014 | Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines. Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle |
| 2014 | Framework for Securing Data in Cloud Storage Services. Mai Dahshan, Sherif Elkassas |
| 2014 | Hybrid-Style Personal Key Management in Ubiquitous Computing. Byoungcheon Lee |
| 2014 | Identifying Cryptographic Functionality in Android Applications. Alexander Oprisnik, Daniel M. Hein, Peter Teufl |
| 2014 | KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. Jinyong Chang, Rui Xue |
| 2014 | Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia |
| 2014 | Keeping an Eye on Your Security Through Assurance Indicators. Moussa Ouedraogo, Chien-Ting Kuo, Simon Tjoa, David Preston, Eric Dubois, Paulo Simões, Tiago Cruz |
| 2014 | Mobile Devices - A Phisher's Paradise. Nikos Virvilis, Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis |
| 2014 | Modeling Requirements for Security-enhanced Design of Embedded Systems. Alberto Ferrante, Igor Kaitovic, Jelena Milosevic |
| 2014 | NFC Based Mobile Single Sign-On Solution as a Chrome Extension. Ufuk Celikkan, Can Gelis |
| 2014 | Network-based Intrusion Prevention System Prototype with Multi-Detection - A Position Paper. Daniel Kavan, Klára Skodová, Martin Klíma |
| 2014 | On Privacy Protection in the Internet Surveillance Era. Dijana Vukovic, Danilo Gligoroski, Zoran Djuric |
| 2014 | On Reliability of Clock-skew-based Remote Computer Identification. Libor Polcak, Barbora Franková |
| 2014 | On the Security of Partially Masked Software Implementations. Alessandro Barenghi, Gerardo Pelosi |
| 2014 | Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization. Pratik Poddar, Achin Bansal, Bernard Menezes |
| 2014 | Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols. Saikrishna Badrinarayanan, C. Pandu Rangan |
| 2014 | Partial Fingerprint Identification Through Correlation-based Approach. Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan |
| 2014 | Privacy Preserving Delegated Word Search in the Cloud. Kaoutar Elkhiyaoui, Melek Önen, Refik Molva |
| 2014 | Pseudorandom Number Generators with Balanced Gray Codes. Jean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi |
| 2014 | QR Steganography - A Threat to New Generation Electronic Voting Systems. Jordi Cucurull, Sandra Guasch, Alex Escala, Guillermo Navarro-Arribas, Víctor Acín |
| 2014 | RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies. Mikko Kiviharju |
| 2014 | Randomized Addition of Sensitive Attributes for l-diversity. Yuichi Sei, Akihiko Ohsuga |
| 2014 | Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers. Frederik Armknecht, Vasily Mikhalev |
| 2014 | Robust Multispectral Palmprint Identification System by Jointly Using Contourlet Decomposition & Gabor Filter Response. Abdallah Meraoumia, Salim Chitroub, Ahmed Bouridane |
| 2014 | SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 Mohammad S. Obaidat, Andreas Holzinger, Pierangela Samarati |
| 2014 | SMS Spam - A Holistic View. Lamine M. Aouad, Alejandro Mosquera, Slawomir Grzonkowski, Dylan Morss |
| 2014 | Secure Key Distribution based on Meteor Burst Communications. Amir I. Sulimov, Arkadij V. Karpov |
| 2014 | Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA. Shizra Sultan, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Ali Nasir |
| 2014 | Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism. Pablo Antón del Pino, Antoine Monsifrot, Charles Salmon-Legagneur, Gwenaël J. Doërr |
| 2014 | Secure Virtual Machine Migration (SV2M) in Cloud Federation. Muhammad Awais Shibli, Naveed Ahmad, Ayesha Kanwal, Abdul Ghafoor Abbasi |
| 2014 | Shellcode Detection in IPv6 Networks with HoneydV6. Sven Schindler, Oliver Eggert, Bettina Schnor, Thomas Scheffler |
| 2014 | Signaling Attacks in Mobile Telephony. Mihajlo Pavloski, Erol Gelenbe |
| 2014 | Software and Hardware Certification Techniques in a Combined Certification Model. Antonio Muñoz, Antonio Maña |
| 2014 | Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments. Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri |
| 2014 | Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud. Maherzia Belaazi, Hanene Boussi Rahmouni, Adel Bouhoula |
| 2014 | Using Abductive and Inductive Inference to Generate Policy Explanations. Fabio Marfia |
| 2014 | Using Bitmaps for Executing Range Queries in Encrypted Databases. Lil María Rodríguez-Henríquez, Debrup Chakraborty |
| 2014 | Using the Juliet Test Suite to Compare Static Security Scanners. Andreas Wagner, Johannes Sametinger |
| 2014 | Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach. Nirnay Ghosh, Triparna Mondal, Debangshu Chatterjee, Soumya K. Ghosh |