All Stories

  1. Poster
  2. IPAL: Breaking up Silos of Protocol-dependent and Domain-specific Industrial Intrusion Detection Systems
  3. PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
  4. A False Sense of Security?
  5. Take a Bite of the Reality Sandwich
  6. BP-MAC: Fast Authentication for Short Messages
  7. Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments
  8. Cybersecurity in Power Grids: Challenges and Opportunities
  9. CoinPrune: Shrinking Bitcoin’s Blockchain Retrospectively
  10. Challenges and Opportunities in Securing the Industrial Internet of Things
  11. Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems
  12. Facilitating Protocol-independent Industrial Intrusion Detection Systems
  13. Cybersecurity Research and Training for Power Distribution Grids -- A Blueprint
  14. Easing the Conscience with OPC UA
  15. Methods for Actors in the Electric Power System to Prevent, Detect and React to ICT Attacks and Failures
  16. Graph-based Model of Smart Grid Architectures
  17. Private Multi-Hop Accountability for Supply Chains
  18. The Quest for Secure and Privacy-preserving Cloud-based Industrial Cooperation
  19. Complying with Data Handling Requirements in Cloud Storage Systems
  20. Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing
  21. Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
  22. The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads
  23. Hi Doppelgänger : Towards Detecting Manipulation in News Comments
  24. Towards an Infrastructure Enabling the Internet of Production
  25. A Case for Integrated Data Processing in Large-Scale Cyber-Physical Systems
  26. Dataflow Challenges in an Internet of Production
  27. Secure Low Latency Communication for Constrained Industrial IoT Scenarios
  28. Towards In-Network Security for Smart Homes
  29. Thwarting Unwanted Blockchain Content Insertion
  30. Secure and anonymous decentralized Bitcoin mixing
  31. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin
  32. A survey on the evolution of privacy enforcement on smartphones and the road ahead
  33. CloudAnalyzer
  34. Privacy-preserving Comparison of Cloud Exposure Induced by Mobile Apps
  35. Analysis of Fingerprinting Techniques for Tor Hidden Services
  36. Network Security and Privacy for Cyber-Physical Systems
  37. Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things
  38. BLOOM: BLoom filter based oblivious outsourced matchings
  39. Veiled in clouds? Assessing the prevalence of cloud computing in the email landscape
  40. Practical Data Compliance for Cloud Storage
  41. Privacy-Preserving HMM Forward Computation
  42. TraceMixer: Privacy-preserving crowd-sensing sans trusted third party
  43. Towards Transparent Information on Individual Cloud Service Usage
  44. POSTER
  45. POSTER
  46. CPPL
  47. Moving Privacy-Sensitive Services from Public Clouds to Decentralized Private Clouds
  48. A comprehensive approach to privacy in the cloud-based Internet of Things
  49. Comparison-Based Privacy: Nudging Privacy in Social Media (Position Paper)
  50. Website Fingerprinting at Internet Scale
  51. Choose Wisely: A Comparison of Secure Two-Party Computation Frameworks
  52. CoinParty
  53. Bandwidth-Optimized Secure Two-Party Computation of Minima
  54. User-Driven Privacy Enforcement for Cloud-Based Services in the Internet of Things
  55. Piccett: Protocol-independent classification of corrupted error-tolerant traffic
  56. A Trust Point-based Security Architecture for Sensor Data in the Cloud
  57. Graph-based redundancy removal approach for multiple cross-layer interactions
  58. SCSlib: Transparently Accessing Protected Sensor Data in the Cloud
  59. SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators
  60. Towards Data Handling Requirements-Aware Cloud Computing
  61. Maintaining User Control While Storing and Processing Sensor Data in the Cloud
  62. Slimfit — A HIP DEX compression layer for the IP-based Internet of Things
  63. The Cloud Needs Cross-Layer Data Handling Annotations
  64. 6LoWPAN fragmentation attacks and mitigation mechanisms
  65. A Cloud design for user-controlled storage and processing of sensor data