| 2015 | Attack Tree Generation by Policy Invalidation. Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller |
| 2015 | Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques. Masoud Narouei, Hassan Takabi |
| 2015 | DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption. Miguel Morales-Sandoval, Arturo Díaz-Pérez |
| 2015 | Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality. Qiao Hu, Lavinia Mihaela Dinca, Gerhard P. Hancke |
| 2015 | Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols. Alejandro Calleja, Pedro Peris-Lopez, Juan E. Tapiador |
| 2015 | How Current Android Malware Seeks to Evade Automated Code Analysis. Siegfried Rasthofer, Irfan Asrar, Stephan Huber, Eric Bodden |
| 2015 | Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings Raja Naeem Akram, Sushil Jajodia |
| 2015 | Lightweight Password Hashing Scheme for Embedded Systems. George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas, Ioannis G. Askoxylakis |
| 2015 | Normalizing Security Events with a Hierarchical Knowledge Base. David Jaeger, Amir Azodi, Feng Cheng, Christoph Meinel |
| 2015 | On Linkability and Malleability in Self-blindable Credentials. Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers |
| 2015 | On Secrecy Amplification Protocols. Radim Ostádal, Petr Svenda, Vashek Matyás |
| 2015 | Practical and Privacy-Preserving TEE Migration. Ghada Arfaoui, Saïd Gharout, Jean-François Lalande, Jacques Traoré |
| 2015 | Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing. Tassos Dimitriou, Ioannis Krontiris |
| 2015 | Private Minutia-Based Fingerprint Matching. Neyire Deniz Sarier |
| 2015 | Randomizing the Montgomery Powering Ladder. Duc-Phong Le, Chik How Tan, Michael Tunstall |
| 2015 | Secure Obfuscation of Authoring Style. Hoi Le Thi, Reihaneh Safavi-Naini, Asadullah Al Galib |
| 2015 | Secure Resource Sharing for Embedded Protected Module Architectures. Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg, Frank Piessens |
| 2015 | Secure and Authenticated Access to LLN Resources Through Policy Constraints. Konstantinos Rantos, Konstantinos Fysarakis, Othonas Sultatos, Ioannis G. Askoxylakis |
| 2015 | WSACd - A Usable Access Control Framework for Smart Home Devices. Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou |