| 2016 | An HMM-Based Anomaly Detection Approach for SCADA Systems. Kyriakos Stefanidis, Artemios G. Voyiatzis |
| 2016 | An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. Jan Tobias Mühlberg, Sara Cleemput, Mustafa A. Mustafa, Jo Van Bulck, Bart Preneel, Frank Piessens |
| 2016 | Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks. Guillaume Barbu, Alberto Battistello |
| 2016 | Attacking and Defending Dynamic Analysis System-Calls Based IDS. Ishai Rosenberg, Ehud Gudes |
| 2016 | Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. Vlasta Stavova, Vashek Matyas, Mike Just |
| 2016 | Combining Third Party Components Securely in Automotive Systems. Madeline Cheah, Siraj A. Shaikh, Jeremy W. Bryans, Hoang Nga Nguyen |
| 2016 | Delegating Biometric Authentication with the Sumcheck Protocol. Hervé Chabanne, Julien Keuffer, Roch Lescuyer |
| 2016 | Fault-Channel Watermarks. Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust |
| 2016 | Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings Sara Foresti, Javier López |
| 2016 | LAMP - Label-Based Access-Control for More Privacy in Online Social Networks. Leila Bahri, Barbara Carminati, Elena Ferrari, William Lucia |
| 2016 | Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent |
| 2016 | Password Generators: Old Ideas and New. Fatma Al Maqbali, Chris J. Mitchell |
| 2016 | Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data. Ling Chen, Ting Yu, Rada Chirkova |
| 2016 | Provable Network Activity for Protecting Users Against False Accusation. Panagiotis Papadopoulos, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos |
| 2016 | Runtime Code Polymorphism as a Protection Against Side Channel Attacks. Damien Couroussé, Thierno Barry, Bruno Robisson, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet |
| 2016 | Securing Transactions with the eIDAS Protocols. Frank Morgner, Paul Bastian, Marc Fischlin |
| 2016 | Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. Vassilios G. Vassilakis, Emmanouil Panaousis, Haralambos Mouratidis |
| 2016 | The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment. Ahmad Sabouri |
| 2016 | Towards Automatic Risk Analysis and Mitigation of Software Applications. Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy |