Abstract is missing.
- Challenges and Opportunities for Security with Differential PrivacyChris Clifton, Balamurugan Anandan. 1-13 [doi]
- An Encrypted In-Memory Column-Store: The Onion Selection ProblemFlorian Kerschbaum, Martin Härterich, Mathias Kohler, Isabelle Hang, Andreas Schaad, Axel Schröpfer, Walter Tighzert. 14-26 [doi]
- Risk Aware Approach to Data Confidentiality in Cloud ComputingKerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu, Sharad Mehrotra. 27-42 [doi]
- Jamming Resistant Schemes for Wireless Communication: A Combinatorial ApproachSamiran Bag, Sushmita Ruj, Bimal K. Roy. 43-62 [doi]
- Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart CardAnkita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay. 63-77 [doi]
- Signcryption from Randomness Recoverable PKE RevisitedAngsuman Das, Avishek Adhikari. 78-90 [doi]
- Auctions with Rational AdversarySourya Joyee De, Asim K. Pal. 91-105 [doi]
- A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Electronic ServicesKoen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens. 106-120 [doi]
- Correctness Verification in Outsourced Databases: More Reliable Fake Tuples ApproachGanugula Umadevi, Ashutosh Saxena. 121-132 [doi]
- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall ManagementSafaa Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci. 133-147 [doi]
- Secure States versus Secure Executions - From Access Control to Flow ControlMathieu Jaume, Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong, Ludovic Mé. 148-162 [doi]
- Monitoring for Slow Suspicious Activities Using a Target Centric ApproachHarsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James. 163-168 [doi]
- RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block CiphersAyesha Khalid, Muhammad Hassan, Anupam Chattopadhyay, Goutam Paul. 169-190 [doi]
- Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper)Naveen Kumar, Anish Mathuria, Manik Lal Das. 191-198 [doi]
- Traitor-Traceable Key Pre-distribution Based on Visual Secret SharingSheethal Kumar, Pai B. J. Jaipal, Sourav Sen Gupta, Vigesh R. Ungrapalli. 199-213 [doi]
- Web Services Based Attacks against Image CAPTCHAsDavid Lorenzi, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri. 214-229 [doi]
- New Long-Term Glimpse of RC4 Stream CipherSubhamoy Maitra, Sourav Sen Gupta. 230-238 [doi]
- A Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETsSoumyadev Maity, R. C. Hansdah. 239-246 [doi]
- Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement ProtocolsDheerendra Mishra, Sourav Mukhopadhyay. 247-254 [doi]
- Information Theoretical Analysis of Side-Channel AttackHiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa. 255-269 [doi]
- Efficient Multi-bit Image Steganography in Spatial DomainImon Mukherjee, Goutam Paul. 270-284 [doi]
- Evolutionary Multibit Grouping Steganographic AlgorithmNabanita Mukherjee, Ayon Bhattacharya, Siddhartha Sekhar Bose. 285-296 [doi]
- Let the Right One in: Discovering and Mitigating Permission GapsBeng Heng Ng, Atul Prakash. 297-313 [doi]
- A Novel RSU-Aided Hybrid Architecture for Anonymous Authentication (RAHAA) in VANETR. V. Pradweap, R. C. Hansdah. 314-328 [doi]
- Recipient Anonymous Ciphertext-Policy Attribute Based EncryptionY. Sreenivasa Rao, Ratna Dutta. 329-344 [doi]
- Error Correction of Partially Exposed RSA Private Keys from MSB SideSantanu Sarkar, Sourav Sen Gupta, Subhamoy Maitra. 345-359 [doi]
- Efficient Enforcement of Privacy for Moving Object TrajectoriesAnuj Shanker Saxena, Vikram Goyal, Debajyoti Bera. 360-374 [doi]
- An Administrative Model for Spatio-Temporal Role Based Access ControlManisha Sharma, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. 375-389 [doi]
- A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete LogarithmYasser Sobhdel, Rasool Jalili. 390-401 [doi]