Abstract is missing.
- Detecting Malicious Domains via Graph InferencePratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William Horne. 1-18 [doi]
- Empirically Measuring WHOIS MisuseNektarios Leontiadis, Nicolas Christin. 19-36 [doi]
- EncDNS: A Lightweight Privacy-Preserving Name Resolution ServiceDominik Herrmann, Karl-Peter Fuchs, Jens Lindemann, Hannes Federrath. 37-55 [doi]
- Ubic: Bridging the Gap between Digital Cryptography and the Physical WorldMark Simkin, Dominique Schröder, Andreas Bulling, Mario Fritz. 56-75 [doi]
- Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled NetworksMoreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter. 76-93 [doi]
- Local Password Validation Using Self-Organizing MapsDiogo Mónica, Carlos Ribeiro. 94-111 [doi]
- Verifiable Delegation of Computations with Storage-Verification Trade-offLiang Feng Zhang, Reihaneh Safavi-Naini. 112-129 [doi]
- Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor NetworksTsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu. 130-147 [doi]
- Verifiable Computation over Large Database with Incremental UpdatesXiaofeng Chen 0001, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou. 148-162 [doi]
- DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android ApplicationsChao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip A. Porras. 163-182 [doi]
- Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic ModelsGuillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez. 183-201 [doi]
- TrustDump: Reliable Memory Acquisition on SmartphonesHe Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Sushil Jajodia. 202-218 [doi]
- A Framework to Secure Peripherals at RuntimeFengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou. 219-238 [doi]
- StealthGuard: Proofs of Retrievability with Hidden WatchdogsMonir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen. 239-256 [doi]
- An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data SharingKaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo. 257-272 [doi]
- Verifiable Computation on Outsourced Encrypted DataJunzuo Lai, Robert H. Deng, HweeHwa Pang, Jian Weng. 273-291 [doi]
- Verifiable Computation with Reduced Informational Costs and Computational CostsGang Xu, George T. Amariucai, Yong Guan. 292-309 [doi]
- Detangling Resource Management Functions from the TCB in Privacy-Preserving VirtualizationMin Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai. 310-325 [doi]
- Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud StorageYujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, Xiao Tan. 326-343 [doi]
- Quantitative Workflow ResiliencyJohn C. Mace, Charles Morisset, Aad P. A. van Moorsel. 344-361 [doi]
- Who Is Touching My CloudHua Deng, Qianhong Wu, Bo Qin, Jian Mao, Xiao Liu, Lei Zhang, Wenchang Shi. 362-379 [doi]
- A Fast Single Server Private Information Retrieval Protocol with Low Communication CostChangyu Dong, Liqun Chen. 380-399 [doi]
- Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted DataBharath Kumar Samanthula, Wei Jiang, Elisa Bertino. 400-418 [doi]
- Authorized Keyword Search on Encrypted DataJie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng. 419-435 [doi]
- Double-Authentication-Preventing SignaturesBertram Poettering, Douglas Stebila. 436-453 [doi]
- Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSLYongge Wang, Tony Nicol. 454-471 [doi]
- Efficient Hidden Vector Encryption with Constant-Size CiphertextTran Viet Xuan Phuong, Guomin Yang, Willy Susilo. 472-487 [doi]
- Enabling Short Fragments for Uncoordinated Spread Spectrum CommunicationNaveed Ahmed, Christina Pöpper, Srdjan Capkun. 488-507 [doi]
- Fingerprinting Far Proximity from Radio EmissionsTao Wang, Yao Liu, Jay Ligatti. 508-525 [doi]
- A Cross-Layer Key Establishment Scheme in Wireless Mesh NetworksYuexin Zhang, Yang Xiang, Xinyi Huang, Li Xu. 526-541 [doi]