Abstract is missing.
- Differential Cryptanalysis and Boomerang Cryptanalysis of LBlockJiageng Chen, Atsuko Miyaji. 1-15 [doi]
- Differential Cryptanalysis and Boomerang Cryptanalysis of LBlockJiageng Chen, Atsuko Miyaji. 1-15 [doi]
- Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and ConstructionsAsato Kubai, Junji Shikata, Yohei Watanabe. 16-28 [doi]
- Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and ConstructionsAsato Kubai, Junji Shikata, Yohei Watanabe. 16-28 [doi]
- On Constructions of MDS Matrices from Companion Matrices for Lightweight CryptographyKishan Chand Gupta, Indranil Ghosh Ray. 29-43 [doi]
- On Constructions of MDS Matrices from Companion Matrices for Lightweight CryptographyKishan Chand Gupta, Indranil Ghosh Ray. 29-43 [doi]
- Code-Based Public-Key Encryption Resistant to Key LeakageEdoardo Persichetti. 44-54 [doi]
- Code-Based Public-Key Encryption Resistant to Key LeakageEdoardo Persichetti. 44-54 [doi]
- Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to BiometricsMasaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba. 55-74 [doi]
- Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to BiometricsMasaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba. 55-74 [doi]
- A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory ImagesAbdel Alim Kamal, Roger Zahno, Amr M. Youssef. 75-90 [doi]
- A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory ImagesAbdel Alim Kamal, Roger Zahno, Amr M. Youssef. 75-90 [doi]
- Cryptanalysis of 2-Layer Nonlinear Piece in Hand MethodXuyun Nie, Albrecht Petzoldt, Johannes Buchmann. 91-104 [doi]
- Cryptanalysis of 2-Layer Nonlinear Piece in Hand MethodXuyun Nie, Albrecht Petzoldt, Johannes Buchmann. 91-104 [doi]
- On the Security of LBlock against the Cube Attack and Side Channel Cube AttackSaad Islam, Mehreen Afzal, Adnan Rashdi. 105-121 [doi]
- On the Security of LBlock against the Cube Attack and Side Channel Cube AttackSaad Islam, Mehreen Afzal, Adnan Rashdi. 105-121 [doi]
- Code-Based Identification and Signature Schemes in SoftwareSidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann. 122-136 [doi]
- Code-Based Identification and Signature Schemes in SoftwareSidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann. 122-136 [doi]
- Fast Software Polynomial Multiplication on ARM Processors Using the NEON EngineDanilo F. Câmara, Conrado Porto Lopes Gouvêa, Julio López, Ricardo Dahab. 137-154 [doi]
- Fast Software Polynomial Multiplication on ARM Processors Using the NEON EngineDanilo F. Câmara, Conrado Porto Lopes Gouvêa, Julio López, Ricardo Dahab. 137-154 [doi]
- Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff CurvesGerwin Gsenger, Christian Hanser. 155-167 [doi]
- Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff CurvesGerwin Gsenger, Christian Hanser. 155-167 [doi]
- Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz CurvesChristian Hanser, Christian Wagner. 168-179 [doi]
- Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz CurvesChristian Hanser, Christian Wagner. 168-179 [doi]
- Cumulus4j: A Provably Secure Database Abstraction LayerMatthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber. 180-193 [doi]
- Cumulus4j: A Provably Secure Database Abstraction LayerMatthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber. 180-193 [doi]
- Optimal Parameters for XMSS MTAndreas Hülsing, Lea Rausch, Johannes Buchmann. 194-208 [doi]
- Optimal Parameters for XMSS MTAndreas Hülsing, Lea Rausch, Johannes Buchmann. 194-208 [doi]
- Solving the Discrete Logarithm Problem for Packing Candidate PreferencesJames Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia. 209-221 [doi]
- Solving the Discrete Logarithm Problem for Packing Candidate PreferencesJames Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia. 209-221 [doi]
- SPA on MIST Exponentiation Algorithm with Multiple Computational SequencesChien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen. 222-235 [doi]
- SPA on MIST Exponentiation Algorithm with Multiple Computational SequencesChien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen. 222-235 [doi]
- Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in CyberspaceClara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione. 236-252 [doi]
- Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in CyberspaceClara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione. 236-252 [doi]
- Analyzing the Internet Stability in Presence of DisastersFrancesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo De Santis. 253-268 [doi]
- Analyzing the Internet Stability in Presence of DisastersFrancesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo De Santis. 253-268 [doi]
- Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 ProjectThomas Schaberreiter, Sébastien Varrette, Pascal Bouvry, Juha Röning, Djamel Khadraoui. 269-287 [doi]
- Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 ProjectThomas Schaberreiter, Sébastien Varrette, Pascal Bouvry, Juha Röning, Djamel Khadraoui. 269-287 [doi]
- How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime FunctionWolfgang Boehmer. 288-304 [doi]
- How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime FunctionWolfgang Boehmer. 288-304 [doi]
- Using Probabilistic Analysis for the Certification of Machine Control SystemsAtif Mashkoor, Osman Hasan, Wolfgang Beer. 305-320 [doi]
- Using Probabilistic Analysis for the Certification of Machine Control SystemsAtif Mashkoor, Osman Hasan, Wolfgang Beer. 305-320 [doi]
- Experimental Investigation in the Impact on Security of the Release Order of Defensive AlgorithmsSuliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel. 321-336 [doi]
- Experimental Investigation in the Impact on Security of the Release Order of Defensive AlgorithmsSuliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel. 321-336 [doi]
- A Multiple-Key Management Scheme in Wireless Sensor NetworksJung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu. 337-344 [doi]
- A Multiple-Key Management Scheme in Wireless Sensor NetworksJung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu. 337-344 [doi]
- VisSecAnalyzer: A Visual Analytics Tool for Network Security AssessmentIgor Kotenko, Evgenia Novikova. 345-360 [doi]
- VisSecAnalyzer: A Visual Analytics Tool for Network Security AssessmentIgor Kotenko, Evgenia Novikova. 345-360 [doi]
- A Denial of Service Attack to GSM Networks via Attach ProcedureNicola Gobbo, Alessio Merlo, Mauro Migliardi. 361-376 [doi]
- A Denial of Service Attack to GSM Networks via Attach ProcedureNicola Gobbo, Alessio Merlo, Mauro Migliardi. 361-376 [doi]
- PPM: Privacy Policy Manager for Personalized ServicesShinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake. 377-392 [doi]
- PPM: Privacy Policy Manager for Personalized ServicesShinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake. 377-392 [doi]
- An Attribute Based Private Data Sharing Scheme for People-Centric Sensing NetworksBo Liu, BaoKang Zhao, Bo Liu, Chunqing Wu. 393-407 [doi]
- An Attribute Based Private Data Sharing Scheme for People-Centric Sensing NetworksBo Liu, BaoKang Zhao, Bo Liu, Chunqing Wu. 393-407 [doi]
- Intelligent UBMSS Systems for Strategic Information ManagementLidia Ogiela, Marek R. Ogiela. 408-413 [doi]
- Intelligent UBMSS Systems for Strategic Information ManagementLidia Ogiela, Marek R. Ogiela. 408-413 [doi]
- Fully Distributed Secure Video Surveillance Via Portable Device with User AwarenessArcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, Francesco Palmieri. 414-429 [doi]
- Fully Distributed Secure Video Surveillance Via Portable Device with User AwarenessArcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, Francesco Palmieri. 414-429 [doi]
- Computer Karate Trainer in Tasks of Personal and Homeland Security DefenseTomasz Hachaj, Marek R. Ogiela. 430-441 [doi]
- Computer Karate Trainer in Tasks of Personal and Homeland Security DefenseTomasz Hachaj, Marek R. Ogiela. 430-441 [doi]
- Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance ScenariosFrancesco Flammini, Stefano Marrone, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini. 442-456 [doi]
- Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance ScenariosFrancesco Flammini, Stefano Marrone, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini. 442-456 [doi]
- A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development ProcessVaise Patu, Shuichiro Yamamoto. 457-464 [doi]
- A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development ProcessVaise Patu, Shuichiro Yamamoto. 457-464 [doi]