Primary Author  | Co-Authors | Title | 
Corella, Francisco Pomcor | Karen Lewison, Pomcor | An Overlooked Cryptographic Requirement for NSTIC | 
Desmedt, Yvo University of College London |   | Secret Sharing and Reliable Cloud Computing | 
Gligoroski, Danilo Department of Telematics, NTNU, Norway | Svein Johan Knapskog, Q2S, NTNU, Norway Simona Samardjiska, Department of Telematics, NTNU, Norway | The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies | 
Hoeper, Katrin Motorola Solutions, Inc.  | Matthew Pirretti, Kevin Gudeth, Ron Buskey (Motorola Solutions, Inc) | Secure App Execution On Commercial Mobile Devices By Means Of Bare Metal Hypervisors | 
Janeja, Vandana University of Maryland, Baltimore Campus (UMBC) | Nabil Adam, Rutgers University Josephine Namayanja, UMBC | IntAleGen: Integrated Alert Generation in Multi Pronged attacks on Networked Systems | 
Keoh, Sye Loong Philips Research Europe | Oscar Garcia-Morchon, Sandeep S. Kumar (Philips Research Europe) | Key Security Challenges in Smart Swarm of Things (SSoT) | 
Kupwade-Patil, Harsh Southern Methodist University | Joseph Camp, Stephen A. Szygenda (Southern Methodist University) | Secure location and energy aware routing in Wireless Sensor Networks using Identity-based cryptography | 
| Kutylowski, Miroslaw  |   | Enabling Development of Applications for Smart Cards – Between Native Solutions and Javacards  | 
Lanzagorta, Marco ITT Corporation |   | Secure Submarine Communications | 
Maiti, Abhranil Virginia Tech | Vikash Gunreddy, Patrick Schaumont (Virginia Tech) | A Framework for the Evaluation of Physical Unclonable Functions | 
Mattsson, Ulf Protegrity | Bart Preneel, Katholieke Universiteit Leuven | A Novel Approach to the Tokenization of Credit Card Numbers | 
McAttee, Tuck Revere Security | Whitfield Diffie, Daniel Engels (Revere Security) | Revere Security Abstract for CETA | 
| McGrew, David |   | Compact Asymmetric Authentication using Hash-based Signatures | 
| McGrew, David |   | A Key Generation System (KGS) Suitable for Sensor and Building Networks | 
Mohan, Apurva Honeywell ACS Labs   |   | Cryptographic Challenges for Smart Grid Home Area Networks Secure Networking | 
Moriyama, Daisuke NICT | Shin'ichiro Matsuo, NICT   | Security/Privacy Models for "Internet of things": What should be studied from RFID-schemes? | 
Parsons, Ron TecSec, Inc. |   | Implementing a Standards Based Dynamic Key Framework to Complement PKI | 
Reyzin, Leonid Boston University | Kyle Brogle, Sharon Goldberg (Boston University) | Aggregate Signatures for BGPsec  | 
Rundgren, Anders PrimeKey Solutions |   | End-To-End Secured Credentialing over the Internet | 
Struik, Rene Struik Security Consultancy |   | Portable Credentials | 
Struik, Rene Struik Security Consultancy |   | Cryptography for Highly Constrained Networks | 
Sturm, John Indiana State University |   | An Open Framework for Low-Latency Communications across the Smart Grid | 
Surber, Beth Ann WV Secretary of State | Jackie Harris, WV Secretary of State | Use of Cryptography in Securing On-line Voting | 
Tsai, Chii-ren Citigroup O&T Risk Management |   | Enterprise Key Management Challenges and Framework | 
| Umezurike, Josiah J.  |   | Symmetric Key Cryptography JJU-256  | 
Vijayarangan, Natarajan  Tata Consultancy Services |   | Trusted Mobile Education (Learning) Software | 
| Volkovs, Nikolajs |   | A Novel Approach to Authentication | 
Zaverucha, Greg Certicom Research |   | ECQV Implicit Certificates and the Cryptographic Suite for Embedded Systems (Suite E) |