Abstract is missing.
- I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy ProbingShuang Zhao, Xiapu Luo, Bo Bai, Xiaobo Ma, Wei Zou, Xinliang Qiu, Man Ho Au. 3-19 [doi]
- MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push ServicesWei Chen 0006, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, Yajuan Tang. 20-39 [doi]
- A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart GridsJingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xingmin Cui, Eric Ke Wang, Jun-bin Fang. 40-56 [doi]
- Towards Bitcoin Payment NetworksPatrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao. 57-76 [doi]
- Statistical Disclosure Control for Data Privacy Using Sequence of Generalised Linear ModelsMin Cherng Lee, Robin Mitra, Emmanuel Lazaridis, An-Chow Lai, Yong Kheng Goh, Wun-She Yap. 77-93 [doi]
- Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor NodesZhe Liu 0001, Johann Großschädl, Lin Li, Qiuliang Xu. 94-112 [doi]
- A Comparison Study of Wireless Network Security in Several Australasian Cities and SuburbsAlastair Nisbet, Andrew Woodward. 115-127 [doi]
- On the Guessability of Resident Registration Numbers in South KoreaYoungbae Song, Hyoungshick Kim, Jun Ho Huh. 128-138 [doi]
- Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential PrivacyShen Yan, Shiran Pan, Yuhang Zhao, Wen Tao Zhu. 141-157 [doi]
- Fair Client Puzzles from the Bitcoin BlockchainColin Boyd, Christopher Carr. 161-177 [doi]
- Privacy-Preserving k-Nearest Neighbour Query on Outsourced DatabaseRui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi. 181-197 [doi]
- Reversible Data Hiding for Encrypted Images Based on Statistical LearningZhen Li, Wei Wu. 198-212 [doi]
- An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam DetectionShigang Liu, Yu Wang, Chao Chen, Yang Xiang. 215-228 [doi]
- Putting the User in Control of the Intelligent Transportation SystemCatalin Gosman, Tudor Cornea, Ciprian Dobre, Florin Pop, Aniello Castiglione. 231-246 [doi]
- Exploring the Space of Digital Evidence - Position PaperCarsten Rudolph. 249-262 [doi]
- Towards Lightweight Anonymous Entity Authentication for IoT ApplicationsYanjiang Yang, Haibin Cai, Zhuo Wei, Haibing Lu, Kim-Kwang Raymond Choo. 265-280 [doi]
- Hybrid MQ Signature for Embedded DeviceShaohua Tang, Bo Lv, Wuqiang Shen. 281-290 [doi]
- Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix ComputationsYujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, Yuan Zhou. 293-309 [doi]
- Accelerating Oblivious Transfer with Batch Multi-exponentiationYang Sun, Qianhong Wu, Jingwen Liu, Jianwei Liu, Xinyi Huang, Bo Qin, Wei Hu. 310-326 [doi]
- CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent MapsXun Yi, Xuechao Yang, Yong Feng, Fengling Han, Ron G. van Schyndel. 329-342 [doi]
- One-Key Compression Function Based MAC with Security Beyond Birthday BoundAvijit Dutta, Mridul Nandi, Goutam Paul. 343-358 [doi]
- Towards Efficient Fully Randomized Message-Locked EncryptionTao Jiang, Xiaofeng Chen 0001, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou. 361-375 [doi]
- Secure and Traceable Framework for Data CirculationKaitai Liang, Atsuko Miyaji, Chunhua Su. 376-388 [doi]
- Public Cloud Data Auditing with Practical Key Update and Zero Knowledge PrivacyYong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang. 389-405 [doi]
- Exploiting the Error Correction Mechanism in QR Codes for Secret SharingYang-Wai Chow, Willy Susilo, Guomin Yang, James G. Phillips, Ilung Pranata, Ari Moesriami Barmawi. 409-425 [doi]
- Password Requirements Markup LanguageMoritz Horsch, Mario Schlipf, Johannes Braun 0001, Johannes A. Buchmann. 426-439 [doi]
- Leakage-Resilient Functional Encryption via Pair EncodingsZuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, Jinguang Han. 443-460 [doi]
- Secret Handshakes with Dynamic Expressive Matching PolicyLin Hou, Junzuo Lai, Lixian Liu. 461-476 [doi]
- Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse ResistanceYinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo. 477-494 [doi]
- Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced DecryptionCong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji. 495-508 [doi]
- Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access StructuresYinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen 0001, Hui Li 0006. 509-524 [doi]
- A Cloud-Based Access Control Scheme with User Revocation and Attribute UpdatePeng Zhang, Zehong Chen, Kaitai Liang, Shulan Wang, Ting Wang. 525-540 [doi]