Security Analysis of the W3C Web Cryptography API
Kelsey Cairns, Harry Halpin and Graham Steel
Algorithm Agility - Discussion on TPM 2.0 ECC Functionalities
Liqun Chen and Rainer Urian
Extending the UML Standards to Model Tree-Structured Data and
their Access Control Requirements
Alberto De La Rosa Algarin and Steven Demurjian
Cross-Tool Semantics for Protocol Security Goals
Joshua Guttman, John Ramsdell and Paul Rowe
A Secure Multicast Group Management and Key Distribution in IEEE
802.21
Yoshikazu Hanatani, Naoki Ogura, Yoshihiro Ohba, Lily Chen and Subir Das
Analysis of a Proposed Hash-Based Signature Standard
Jonathan Katz
State Management for Hash-Based Signatures
David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag, Denis Butin and Johannes Buchmann
NFC Payment Spy: A Privacy Attack on Contactless Payments
Maryam Mehrnezhad, Mohammed Aamir Ali, Feng Hao and Aad van Moorsel
Attribute-based Access Control Architectures with the eIDAS Protocols
Frank Morgner, Paul Bastian and Marc Fischlin
Reactive and Proactive Standardisation of TLS
Kenneth Paterson and Thyla van der Merwe
Cryptanalysis of GlobalPlatform Secure Channel Protocols
Mohamed Sabt and Jacques Traore
Analyzing and Fixing the QACCE security of QUIC
Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani and Maki Yoshida