| 2016 | 3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud. Manoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello |
| 2016 | A Code-based Group Signature Scheme with Shorter Public Key Length. Hafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi |
| 2016 | A Friend or a Foe? Detecting Malware using Memory and CPU Features. Jelena Milosevic, Miroslaw Malek, Alberto Ferrante |
| 2016 | A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management. Abir Awad, Brian Lee |
| 2016 | A Practical Encrypted Microprocessor. Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu |
| 2016 | A Pre-clustering Method To Improve Anomaly Detection. Denis Hock, Martin Kappes, Bogdan V. Ghita |
| 2016 | A Second Order Derivatives based Approach for Steganography. Jean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux |
| 2016 | A Template Attack Against VERIFY PIN Algorithms. Hélène Le Bouder, Thierno Barry, Damien Couroussé, Jean-Louis Lanet, Ronan Lashermes |
| 2016 | Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions. George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis, Theodore K. Apostolopoulos |
| 2016 | Computations on Private Sets and their Application to Biometric based Authentication Systems. Wojciech Wodo, Lucjan Hanzlik, Kamil Kluczniak |
| 2016 | Differential Addition in Edwards Coordinates Revisited and a Short Note on Doubling in Twisted Edwards Form. Srinivasa Rao Subramanya Rao |
| 2016 | Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification. Sumanta Chatterjee, Alwyn R. Pais, Sumit Saurabh |
| 2016 | Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems. Cristina Alcaraz, Javier López, Kim-Kwang Raymond Choo |
| 2016 | Efficient Proxy Signature Scheme from Pairings. Francesco Buccafurri, Rajeev Anand Sahu, Vishal Saraswat |
| 2016 | Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications. Andrea Lesavourey, Christophe Nègre, Thomas Plantard |
| 2016 | Enhancing Operation Security using Secret Sharing. Mohsen Ahmadvand, Antoine Scemama, Martín Ochoa, Alexander Pretschner |
| 2016 | Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade Controllers. Bogdan Groza, Pal-Stefan Murvay, Tudor Andreica |
| 2016 | FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case Study. Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux |
| 2016 | FPGA Implementation of HS1-SIV. Gerben Geltink, Sergei Volokitin |
| 2016 | Hardware Accelerator for Stream Cipher Spritz. Debjyoti Bhattacharjee, Anupam Chattopadhyay |
| 2016 | How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis. Gerardo Canfora, Francesco Mercaldo, Antonio Pirozzi, Corrado Aaron Visaggio |
| 2016 | ISDSR: Secure DSR with ID-based Sequential Aggregate Signature. Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara |
| 2016 | LP-Cache: Privacy-aware Cache Model for Location-based Apps. Asma Patel, Esther Palomar |
| 2016 | Lean and Fast Secure Multi-party Computation: Minimizing Communication and Local Computation using a Helper. Johannes Schneider |
| 2016 | Multi-Device Authentication using Wearables and IoT. Jan Hajny, Petr Dzurenda, Lukas Malina |
| 2016 | OSCIDS: An Ontology based SCADA Intrusion Detection Framework. Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer |
| 2016 | Oblivious Voting: Hiding Votes from the Voting Machine in Bingo Voting. Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade, Jochen Rill |
| 2016 | On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets. Sara Barakat, Bechara al Bouna, Mohamed Nassar, Christophe Guyeux |
| 2016 | PACCo: Privacy-friendly Access Control with Context. Andreas Put, Bart De Decker |
| 2016 | PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds. Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia |
| 2016 | Practical Application of Order-preserving Encryption in Wide Column Stores. Tim Waage, Daniel Homann, Lena Wiese |
| 2016 | Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon. Nicolas T. Courtois, Pouyan Sepehrdad, Guangyan Song, Iason Papapanagiotakis-Bousy |
| 2016 | Predictive Model for Exploit Kit based Attacks. Slim Trabelsi, Skander Ben Mahmoud, Anis Zouaoui |
| 2016 | Private Multi-party Matrix Multiplication and Trust Computations. Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys |
| 2016 | Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016. Christian Callegari, Marten van Sinderen, Panagiotis G. Sarigiannidis, Pierangela Samarati, Enrique Cabello, Pascal Lorenz, Mohammad S. Obaidat |
| 2016 | Protecting Databases from Schema Disclosure - A CRUD-Based Protection Model. Óscar Mortágua Pereira, Diogo Domingues Regateiro, Rui L. Aguiar |
| 2016 | Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution. Giada Sciarretta, Alessandro Armando, Roberto Carbone, Silvio Ranise |
| 2016 | Sensor-based Wearable PUF. Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto |
| 2016 | Silent and Continuous Authentication in Mobile Environment. Gerardo Canfora, Paolo Di Notte, Francesco Mercaldo, Corrado Aaron Visaggio |
| 2016 | Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance. Johannes Schneider, Bin Lu, Thomas Locher, Yvonne-Anne Pignolet, Matús Harvan, Sebastian Obermeier |
| 2016 | The Cost of Breaking a Quantum Bit Commitment Protocol on Equivalence Classes. Ahmet Emin Tatar, Marius Nagy, Naya Nagy |
| 2016 | The Mathematical Foundations for Mapping Policies to Network Devices. Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner |
| 2016 | Thermal Imaging Attacks on Keypad Security Systems. Wojciech Wodo, Lucjan Hanzlik |
| 2016 | Threats to 5G Group-based Authentication. Rosario Giustolisi, Christian Gehrmann |
| 2016 | Towards Access Control for Isolated Applications. Kirill Belyaev, Indrakshi Ray |
| 2016 | Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy. Tomoaki Mimoto, Anirban Basu, Shinsaku Kiyomoto |
| 2016 | Towards a Software Approach to Mitigate Correlation Power Analysis. Ibraheem Frieslaar, Barry Irwin |
| 2016 | Transitioning to a Javascript Voting Client for Remote Online Voting. Jordi Cucurull, Sandra Guasch, David Galindo |
| 2016 | Two Secure Anonymous Proxy-based Data Storages. Olivier Blazy, Xavier Bultel, Pascal Lafourcade |
| 2016 | User-friendly Manual Transfer of Authenticated Online Banking Transaction Data - A Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information Scheme. Sven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen |
| 2016 | Verifiable Policy-defined Networking for Security Management. Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung X. Nguyen, Marian Mihailescu, Michelle McClintock |
| 2016 | Web-based Fingerprinting Techniques. Vitor Bernardo, Dulce Domingos |