Abstract is missing.
- AppInk: watermarking android apps for repackaging deterrenceWu Zhou, Xinwen Zhang, Xuxian Jiang. 1-12 [doi]
- PSiOS: bring your own privacy & security to iOS devicesTim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz. 13-24 [doi]
- On the effectiveness of API-level access control using bytecode rewriting in AndroidHao Hao, Vicky Singh, Wenliang Du. 25-36 [doi]
- Designing leakage-resilient password entry on touchscreen mobile devicesQiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng. 37-48 [doi]
- Your love is public now: questioning the use of personal information in authenticationPayas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao. 49-60 [doi]
- Multi-key leakage-resilient threshold cryptographyCong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He. 61-70 [doi]
- Privacy-preserving multi-keyword text search in the cloud supporting similarity-based rankingWenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li. 71-82 [doi]
- Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanismAtsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama. 83-94 [doi]
- Blank digital signaturesChristian Hanser, Daniel Slamanig. 95-106 [doi]
- Pseudorandom signaturesNils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering. 107-118 [doi]
- Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detectionDavide Maiorca, Igino Corona, Giorgio Giacinto. 119-130 [doi]
- Efficient user-space information flow controlBen Niu, Gang Tan. 131-142 [doi]
- SocialWatch: detection of online service abuse via large-scale social graphsJunxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao. 143-148 [doi]
- Privacy settings in social networking systems: what you cannot controlAmirreza Masoumzadeh, James Joshi. 149-154 [doi]
- Trustworthy distributed computing on social networksAbedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim. 155-160 [doi]
- On the feasibility of inference attacks by third-party extensions to social network systemsSeyed Hossein Ahmadinejad, Philip W. L. Fong. 161-166 [doi]
- Dynamix: anonymity on dynamic social structuresAbedelaziz Mohaisen, Yongdae Kim. 167-172 [doi]
- Protecting access privacy of cached contents in information centric networksAbedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim. 173-178 [doi]
- The role and effectiveness of cryptography in network virtualization: a position paperWenbo Mao. 179-182 [doi]
- Efficient dynamic provable possession of remote data via balanced update treesYihua Zhang, Marina Blanton. 183-194 [doi]
- Weak leakage-resilient client-side deduplication of encrypted data in cloud storageJia Xu, Ee-Chien Chang, Jianying Zhou. 195-206 [doi]
- Data-oblivious graph algorithms for secure computation and outsourcingMarina Blanton, Aaron Steele, Mehrdad Aliasgari. 207-218 [doi]
- SecLaaS: secure logging-as-a-service for cloud forensicsShams Zawoad, Amit Kumar Dutta, Ragib Hasan. 219-230 [doi]
- An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell. 231-242 [doi]
- Expressive search on encrypted dataJunzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen. 243-252 [doi]
- Towards asymmetric searchable encryption with message recovery and flexible search authorizationQiang Tang, Xiaofeng Chen 0001. 253-264 [doi]
- Boolean symmetric searchable encryptionTarik Moataz, Abdullatif Shikfa. 265-276 [doi]
- Multi-channel broadcast encryptionDuong Hieu Phan, David Pointcheval, Viet Cuong Trinh. 277-286 [doi]
- Comparative study of multicast authentication schemes with application to wide-area measurement systemYee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami. 287-298 [doi]
- Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARMLucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi. 299-310 [doi]
- Enforcing system-wide control flow integrity for exploit detection and diagnosisAravind Prakash, Heng Yin, Zhenkai Liang. 311-322 [doi]
- Secure cloud-assisted location based reminderXinxin Zhao, Lingjun Li, Guoliang Xue. 323-328 [doi]
- DroidChameleon: evaluating Android anti-malware against transformation attacksVaibhav Rastogi, Yan Chen, Xuxian Jiang. 329-334 [doi]
- Bind your phone number with caution: automated user profiling through address book matching on smartphoneYao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng. 335-340 [doi]
- Towards preventing QR code based attacks on android phone using security warningsHuiping Yao, Dongwan Shin. 341-346 [doi]
- Time evolving graphical password for securing mobile devicesZhan Wang, Jiwu Jing, Liang Li. 347-352 [doi]
- DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malwareYibing Zhongyang, Zhi-Xin, Bing Mao, Li Xie. 353-358 [doi]
- k-anonymous reputationSebastian Clauß, Stefan Schiffner, Florian Kerschbaum. 359-368 [doi]
- Privacy-preserving smart metering with regional statistics and personal enquiry servicesCheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou. 369-380 [doi]
- Protecting privacy by sanitizing personal data: a new approach to anonymous credentialsSébastien Canard, Roch Lescuyer. 381-392 [doi]
- An information-flow type-system for mixed protocol secure computationFlorian Kerschbaum. 393-404 [doi]
- Robust network traffic identification with unknown applicationsJun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou. 405-414 [doi]
- STRIDE: sanctuary trail - refuge from internet DDoS entrapmentHsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang 0003, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig. 415-426 [doi]
- Practical verification of WPA-TKIP vulnerabilitiesMathy Vanhoef, Frank Piessens. 427-436 [doi]
- Faster secure two-party computation with less memoryWilko Henecka, Thomas Schneider 0003. 437-446 [doi]
- TabShots: client-side detection of tabnabbing attacksPhilippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen. 447-456 [doi]
- Fuzzing the ActionScript virtual machineGuanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang. 457-468 [doi]
- Sensing-enabled channels for hard-to-detect command and control of mobile devicesRagib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart. 469-480 [doi]
- LogicScope: automatic discovery of logic vulnerabilities within web applicationsXiaowei Li 0003, Yuan Xue. 481-486 [doi]
- Protecting function pointers in binaryChao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres. 487-492 [doi]
- The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilitiesViet Hung Nguyen, Fabio Massacci. 493-498 [doi]
- Horizon extender: long-term preservation of data leakage evidence in web trafficDavid Gugelmann, Dominik Schatzmann, Vincent Lenders. 499-504 [doi]
- Towards fully incremental cryptographic schemesKevin Atighehchi, Traian Muntean. 505-510 [doi]
- Anonymous attribute-based encryption supporting efficient decryption testYinghui Zhang, Xiaofeng Chen 0001, Jin Li, Duncan S. Wong, Hui Li. 511-516 [doi]
- A group signature scheme with unbounded message-dependent openingKazuma Ohara, Yusuke Sakai, Keita Emura, Goichiro Hanaoka. 517-522 [doi]
- Attribute-based fine-grained access control with efficient revocation in cloud storage systemsKan Yang, Xiaohua Jia, Kui Ren. 523-528 [doi]
- Covert computation: hiding code in code for obfuscation purposesSebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar Weippl. 529-534 [doi]
- Proof of plaintext knowledge for code-based public-key encryption revisitedRong Hu, Kirill Morozov, Tsuyoshi Takagi. 535-540 [doi]
- An efficient and probabilistic secure bit-decompositionBharath K. Samanthula, Chun Hu, Wei Jiang. 541-546 [doi]
- Defining verifiability in e-auction protocolsJannik Dreier, Hugo Jonker, Pascal Lafourcade. 547-552 [doi]
- Verifiable and private top-k monitoringXuhua Ding, HweeHwa Pang, Junzuo Lai. 553-558 [doi]