| 2018 | Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings Gerhard P. Hancke, Ernesto Damiani |
| 2017 | A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps. Öznur Kalkar, Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol |
| 2017 | A Secure and Trusted Channel Protocol for UAVs Fleets. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette |
| 2017 | A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons. Pau Conejero-Alberola, M. Francisca Hinarejos, Josep-Lluís Ferrer-Gomila |
| 2017 | AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics. Yonas Leguesse, Mark Vella, Joshua Ellul |
| 2017 | EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis |
| 2017 | Examination of a New Defense Mechanism: Honeywords. Ziya Alper Genç, Süleyman Kardas, Mehmet Sabir Kiraz |
| 2017 | Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications. Madeline Cheah, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj A. Shaikh |
| 2017 | How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip. Sébanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet, Axel Legay |
| 2017 | JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language. Hao Jiang, Ahmed Bouabdallah |
| 2017 | Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database. Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello |
| 2017 | Philanthropy on the Blockchain. Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes |
| 2017 | Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough? Nektaria Kaloudi, Aikaterini Mitrokotsa |