| 2013 | A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards. Michael Lackner, Reinhard Berlach, Wolfgang Raschke, Reinhold Weiss, Christian Steger |
| 2013 | A Forward Privacy Model for RFID Authentication Protocols. Daisuke Moriyama, Miyako Ohkubo, Shin'ichiro Matsuo |
| 2013 | Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks. Panagiotis Ilia, George C. Oikonomou, Theo Tryfonas |
| 2013 | Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings Lorenzo Cavallaro, Dieter Gollmann |
| 2013 | Lightweight Authentication Protocol for Low-Cost RFID Tags. Pierre Dusart, Sinaly Traoré |
| 2013 | Malleable Signatures for Resource Constrained Platforms. Henrich Christopher Pöhls, Stefan Peters, Kai Samelin, Joachim Posegga, Hermann de Meer |
| 2013 | Multiplicative Homomorphic E-Auction with Formally Provable Security. Kun Peng, Matt Henricksen |
| 2013 | On Secure Embedded Token Design. Simon Hoerder, Kimmo Järvinen, Daniel Page |
| 2013 | Online Banking with NFC-Enabled Bank Card and NFC-Enabled Smartphone. Max Günther, Bernd Borchert |
| 2013 | URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security. Daniel Schreckling, Stephan Huber, Focke Höhne, Joachim Posegga |