Abstract is missing.
- Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined NetworksHuishan Bian, Liehuang Zhu, Meng Shen, Mingzhong Wang, Chang Xu, Qiongyu Zhang. 3-16 [doi]
- Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault ToleranceHuafei Zhu. 17-31 [doi]
- Another Look at Aggregate Signatures: Their Capability and Security on Network GraphsNaoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto. 32-48 [doi]
- Universally Composable Oblivious Database in the Presence of Malicious AdversariesHuafei Zhu. 49-61 [doi]
- Public Key Encryption with Distributed Keyword SearchVeronika Kuchta, Mark Manulis. 62-83 [doi]
- A Signature Generation Approach Based on Clustering for Polymorphic WormJie Wang, Xiaoxian He. 84-96 [doi]
- Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSSHui Zhao, Kouichi Sakurai. 99-113 [doi]
- Attribute-Based Signatures with Controllable LinkabilityMiguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen. 114-129 [doi]
- A Causality-Based Model for Describing the Trustworthiness of a Computing DeviceJiun Yi Yap, Allan Tomlinson. 130-149 [doi]
- An Application-Oriented Efficient Encapsulation System for Trusted Software DevelopmentZheng-Tao, Jun Hu, Jing Zhan, Mo Li, Chunzi Chen. 153-168 [doi]
- Research on Trusted Bootstrap Based on the Universal Smart CardLin Yan, Jian-biao Zhang. 169-182 [doi]
- Application of NTRU Using Group Rings to Partial Decryption TechniqueTakanori Yasuda, Hiroaki Anada, Kouichi Sakurai. 203-213 [doi]
- RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android PlatformLi Lin, Jian Ni, Jian Hu, Jian-biao Zhang. 214-225 [doi]
- An Audit Log Protection Mechanism Based on Security ChipGuan Wang, Ziyi Wang, Jian Sun, Jun Zhou. 226-233 [doi]