| 2015 | A Flexible Architecture for Industrial Control System Honeypots. Alexandru Vlad Serbanescu, Sebastian Obermeier, Der-Yeuan Yu |
| 2015 | A Formally Verified Access Control Mechanism for Information Centric Networks. Mahdi Aiash, Jonathan Loo |
| 2015 | A Framework for Incident Response in Industrial Control Systems. Roman Schlegel, Ana Hristova, Sebastian Obermeier |
| 2015 | A Key-private Cryptosystem from the Quadratic Residuosity. Marc Joye |
| 2015 | A Note on Schoenmakers Algorithm for Multi Exponentiation. Srinivasa Rao Subramanya Rao |
| 2015 | A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange. Luigi Maria Bottasso |
| 2015 | A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies. Faouzi Jaïdi, Faten Labbene Ayachi |
| 2015 | A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux. Peter Amthor |
| 2015 | Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection. Tayeb Kenaza, Abdenour Labed, Yacine Boulahia, Mohcen Sebehi |
| 2015 | Algorithmic Information Theory for Obfuscation Security. Rabih Mohsen, Alexandre Miranda Pinto |
| 2015 | An OWL-based XACML Policy Framework. Fabio Marfia, Mario Arrigoni Neri, Filippo Pellegrini, Marco Colombetti |
| 2015 | Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery. Catalin V. Bîrjoveanu |
| 2015 | Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units. Martin Salfer, Claudia Eckert |
| 2015 | Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position. George Stergiopoulos, Panagiotis Petsanas, Panagiotis Katsaros, Dimitris Gritzalis |
| 2015 | Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?. Zisis Tsiatsikas, Alexandros Fakis, Dimitrios Papamartzivanos, Dimitris Geneiatakis, Georgios Kambourakis, Constantinos Kolias |
| 2015 | Cloud Resources Placement based on Functional and Non-functional Requirements. Asma Guesmi, Patrice Clemente, Frédéric Loulergue, Pascal Berthomé |
| 2015 | Controlled Proxy Re-signing - Conditional Proxy Re-Signatures. S. Sree Vivek, Guhan Balasubramanian |
| 2015 | Counter based Detection and Mitigation of Signalling Attacks. Mihajlo Pavloski, Gökçe Görbil, Erol Gelenbe |
| 2015 | DPA Resistance Enhancement through a Self-healing PLL based Power Mask. Fleura Hajilou, Ehsan Mazidi, Shahab Ardalan |
| 2015 | Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES. Bholanath Roy, Ravi Prakash Giri, Ashokkumar C., Bernard Menezes |
| 2015 | Design and Performance Aspects of Information Security Prediction Markets for Risk Management. Pankaj Pandey, Einar Arthur Snekkenes |
| 2015 | Distributed Intrusion Detection System based on Anticipation and Prediction Approach. Hajar Benmoussa, Anas Abou El Kalam, Abdellah Ait Ouahman |
| 2015 | Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics. Malek Belhaouane, Joaquín García-Alfaro, Hervé Debar |
| 2015 | Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints. Johan Garcia |
| 2015 | Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment. Alexey D. Smolyakov, Amir I. Sulimov, Arkadij V. Karpov, Aidar V. Galiev |
| 2015 | Formal Analysis of E-Cash Protocols. Jannik Dreier, Ali Kassem, Pascal Lafourcade |
| 2015 | Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack. Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto |
| 2015 | Light Blind: Why Encrypt If You Can Share?. Pierpaolo Cincilla, Aymen Boudguiga, Makhlouf Hadji, Arnaud Kaiser |
| 2015 | MEDA: A Machine Emulation Detection Algorithm. Valerio Selis, Alan Marshall |
| 2015 | MoCrySIL - Carry Your Cryptographic Keys in Your Pocket. Florian Reimair, Peter Teufl, Christian Kollmann, Christoph Thaller |
| 2015 | Mobile Malware Detection using Op-code Frequency Histograms. Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio |
| 2015 | Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies. Worachet Uttha, Clara Bertolissi, Silvio Ranise |
| 2015 | Monitoring Software Vulnerabilities through Social Networks Analysis. Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari |
| 2015 | New Results for Partial Key Exposure on RSA with Exponent Blinding. Stelvio Cimato, Silvia Mella, Ruggero Susella |
| 2015 | On the Instability of Sensor Orientation in Gait Verification on Mobile Phone. Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen |
| 2015 | Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve. Christophe Nègre, Jean-Marc Robert |
| 2015 | Performance Evaluation of Meteor Key Distribution. Amir I. Sulimov, Arkadij V. Karpov |
| 2015 | Phish-IDetector: Message-Id Based Automatic Phishing Detection. Rakesh M. Verma, Nirmala Rai |
| 2015 | Policy Anomaly Detection for Distributed IPv6 Firewalls. Claas Lorenz, Bettina Schnor |
| 2015 | Practical IBE Secure under CBDH - Encrypting Without Pairing. S. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra, C. Pandu Rangan |
| 2015 | Practical and Secure Integrated PKE+PEKS with Keyword Privacy. Francesco Buccafurri, Gianluca Lax, Rajeev Anand Sahu, Vishal Saraswat |
| 2015 | Preserving Privacy in Collaborative Business Process Composition. Hassaan Irshad, Basit Shafiq, Jaideep Vaidya, Muhammad Ahmed Bashir, Shafay Shamail, Nabil R. Adam |
| 2015 | Private Eyes: Secure Remote Biometric Authentication. Ewa Syta, Michael J. Fischer, David Wolinsky, Abraham Silberschatz, Gina Gallegos-García, Bryan Ford |
| 2015 | Revealing Encrypted WebRTC Traffic via Machine Learning Tools. Mario Di Mauro, Maurizio Longo |
| 2015 | SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015. Mohammad S. Obaidat, Pascal Lorenz, Pierangela Samarati |
| 2015 | Scargos: Towards Automatic Vulnerability Distribution. Florian Rhinow, Michael Clear |
| 2015 | Secure Physical Access Control with Strong Cryptographic Protection. Jan Hajny, Petr Dzurenda, Lukas Malina |
| 2015 | Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET. Kaibin Huang, Yu-Chi Chen, Raylin Tso |
| 2015 | Solving the Grid Defender's Dilemma: Tamper Protection for Distributed Cyber-Physical Systems. Jason Reeves, Sean W. Smith |
| 2015 | Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations. Eduardo B. Fernández, Dereje Yimam |
| 2015 | Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment. Lukas Malina, Petr Munster, Jan Hajny, Tomás Horváth |
| 2015 | WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification. Jennifer Bellizzi, Mark Vella |
| 2015 | hHB: A Harder HB Ka Ahmad Khoureich |