| 2017 | (In) Security in Graph Databases - Analysis and Data Leaks. Miguel Hernández Boza, Alfonso Muñoz |
| 2017 | A Card-less TEE-based Solution for Trusted Access Control. Mohamed Amine Bouazzouni, Emmanuel Conchon, Fabrice Peyrard, Pierre-François Bonnefoi |
| 2017 | A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid. Alireza Jolfaei, Krishna Kant |
| 2017 | A Lightweight Online Advertising Classification System using Lexical-based Features. Xichen Zhang, Arash Habibi Lashkari, Ali A. Ghorbani |
| 2017 | A Probabilistic Baby-step Giant-step Algorithm. Prabhat Kushwaha, Ayan Mahalanobis |
| 2017 | A Review of PROFIBUS Protocol Vulnerabilities - Considerations for Implementing Authentication and Authorization Controls. Venesa Watson, Xinxin Lou, Yuan Gao |
| 2017 | Accelerating Square Root Computations Over Large GF (2m). Salah S. Harb, Moath H. A. Jarrah |
| 2017 | Adding Privacy Protection to Distributed Software Systems. George O. M. Yee |
| 2017 | Analysis of Intrusion Detection Systems in Industrial Ecosystems. Juan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier López |
| 2017 | Anonymous Credentials with Practical Revocation using Elliptic Curves. Petr Dzurenda, Jan Hajny, Lukas Malina, Sara Ricci |
| 2017 | Attribute based Encryption for Multi-level Access Control Policies. Nesrine Kaaniche, Maryline Laurent |
| 2017 | Capturing the Effects of Attribute based Correlation on Privacy in Micro-databases. Debanjan Sadhya, Bodhi Chakraborty, Sanjay Kumar Singh |
| 2017 | Clustering-based Approach for Anomaly Detection in XACML Policies. Maryem Ait El Hadj, Meryeme Ayache, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi |
| 2017 | Constant-size Threshold Attribute based SignCryption for Cloud Applications. Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia |
| 2017 | Context-based Encryption Applied to Data Leakage Prevention Solutions. Alberto García, Alberto Garcia Moro, José Javier García, Jorge Roncero, Víctor A. Villagrá, Helena Jalain |
| 2017 | Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth. Florian Reimair, Johannes Feichtner, Dominik Ziegler, Sandra Kreuzhuber, Thomas Zefferer |
| 2017 | Differential and Rotational Cryptanalysis of Round-reduced MORUS. Ashutosh Dhar Dwivedi, Pawel Morawiecki, Sebastian Wójtowicz |
| 2017 | Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream. Ashutosh Dhar Dwivedi, Pawel Morawiecki, Sebastian Wójtowicz |
| 2017 | Efficient Heuristic Safety Analysis of Core-based Security Policies. Peter Amthor |
| 2017 | Evaluating Credit Card Transactions in the Frequency Domain for a Proactive Fraud Detection Approach. Roberto Saia, Salvatore Carta |
| 2017 | Experimental Assessment of Private Information Disclosure in LTE Mobile Networks. Stig Fr. Mjølsnes, Ruxandra F. Olimid |
| 2017 | Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge. João Amarante, João Paulo Barros |
| 2017 | Face Recognition-based Presentation Attack Detection in a Two-step Segregated Automated Border Control e-Gate - Results of a Pilot Experience at Adolfo Suárez Madrid-Barajas Airport. David Ortega del Campo, Cristina Conde, Ángel Serrano, Isaac Martín de Diego, Enrique Cabello |
| 2017 | Fair and Accountable Anonymity for the Tor Network. Jesus Diaz, David Arroyo, Francisco B. Rodríguez |
| 2017 | First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography. Damien Jauvart, Jacques J. A. Fournier, Louis Goubin |
| 2017 | FlowSlicer - A Hybrid Approach to Detect and Avoid Sensitive Information Leaks in Android Applications using Program Slicing and Instrumentation. Luis Menezes, Roland Wismüller |
| 2017 | Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical Memory. Diogo Barradas, Tiago Brito, David Duarte, Nuno Santos, Luís E. T. Rodrigues |
| 2017 | Formal Analyze of a Private Access Control Protocol to a Cloud Storage. Mouhebeddine Berrima, Pascal Lafourcade, Matthieu Giraud, Narjes Ben Rajeb |
| 2017 | Formally Verifying Flow Properties in Industrial Systems. Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch |
| 2017 | Freeze & Crypt: Linux Kernel Support for Main Memory Encryption. Manuel Huber, Julian Horsch, Junaid Ali, Sascha Wessel |
| 2017 | GLITCH: A Discrete Gaussian Testing Suite for Lattice-based Cryptography. James Howe, Máire O'Neill |
| 2017 | HAIT: Heap Analyzer with Input Tracing. Andrea S. Atzeni, Andrea Marcelli, Francesco Muroni, Giovanni Squillero |
| 2017 | Improving Throughput in BB84 Quantum Key Distribution. Shawn A. Prestridge, James G. Dunham |
| 2017 | Information Flows at OS Level Unmask Sophisticated Android Malware. Valérie Viet Triem Tong, Aurélien Trulla, Mourad Leslous, Jean-François Lalande |
| 2017 | Interaction Platform for Improving Detection Capability of Dynamic Application Security Testing. Jonghwan Im, Jongwon Yoon, Minsik Jin |
| 2017 | LOCALPKI: A User-Centric Formally Proven Alternative to PKIX. Jean-Guillaume Dumas, Pascal Lafourcade, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel |
| 2017 | Mining Encrypted Software Logs using Alpha Algorithm. Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk |
| 2017 | Mobile Silent and Continuous Authentication using Apps Sequence. Gerardo Canfora, Giovanni Cappabianca, Pasquale Carangelo, Fabio Martinelli, Francesco Mercaldo, Ernesto Rosario Russo, Corrado Aaron Visaggio |
| 2017 | On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes. Gaurav Pareek, B. R. Purushothama |
| 2017 | On Obfuscating Compilation for Encrypted Computing. Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu |
| 2017 | On the Application of Fuzzy Set Theory for Access Control Enforcement. Diogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar |
| 2017 | On the Relation Between SIM and IND-RoR Security Models for PAKEs. José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot |
| 2017 | One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGA. Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux |
| 2017 | PAnTHErS: A Prototyping and Analysis Tool for Homomorphic Encryption Schemes. Cyrielle Feron, Vianney Lapotre, Loïc Lagadec |
| 2017 | PB-PKI: A Privacy-aware Blockchain-based PKI. Louise Axon, Michael Goldsmith |
| 2017 | Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption. Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade |
| 2017 | Privacy as a Currency: Un-regulated?. Vishwas T. Patil, R. K. Shyamasundar |
| 2017 | Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol. Rosario Giustolisi, Vincenzo Iovino, Gabriele Lenzini |
| 2017 | Privacy-preserving Disease Susceptibility Test with Shamir's Secret Sharing. Guyu Fan, Manoranjan Mohanty |
| 2017 | Privacy-preserving Regression on Partially Encrypted Data. Matús Harvan, Thomas Locher, Marta Mularczyk, Yvonne-Anne Pignolet |
| 2017 | Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017. Pierangela Samarati, Mohammad S. Obaidat, Enrique Cabello |
| 2017 | Program Execution Analysis using UserAssist Key in Modern Windows. Bhupendra Singh, Upasna Singh |
| 2017 | Reputation Management in Online Social Networks - A New Clustering-based Approach. Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia |
| 2017 | RmPerm: A Tool for Android Permissions Removal. Simone Aonzo, Giovanni Lagorio, Alessio Merlo |
| 2017 | SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. Ashutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk, Sebastian Wójtowicz |
| 2017 | SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices. Giulio Aliberti, Roberto Di Pietro, Stefano Guarino |
| 2017 | Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System. Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim |
| 2017 | Short Paper: Industrial Feasibility of Private Information Retrieval. Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad |
| 2017 | Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure. Jaroslaw Bernacki, Marek Klonowski, Piotr Syga |
| 2017 | Strong Authentication for e-Banking: A Survey on European Regulations and Implementations. Federico Sinigaglia, Roberto Carbone, Gabriele Costa |
| 2017 | The Efficient Randomness Testing using Boolean Functions. Marek Sýs, Dusan Klinec, Petr Svenda |
| 2017 | The Net Rat - Rethinking Connected Services for Increased Security. Bernd Prünster, Florian Reimair, Andreas Reiter |
| 2017 | The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity. Louis Philippe Sondeck, Maryline Laurent, Vincent Frey |
| 2017 | Towards a Self-adaptive Trust Management Model for VANETs. Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia |
| 2017 | Using a History-based Profile to Detect and Respond to DDoS Attacks. Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray |
| 2017 | Vector Quantization based Steganography for Secure Speech Communication System. Bekkar Laskar, Merouane Bouzid |
| 2017 | s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables. Gerardo Canfora, Antonio Pirozzi, Aaron Visaggio |