Abstract is missing.
- Property-Based TPM VirtualizationAhmad-Reza Sadeghi, Christian Stüble, Marcel Winandy. 1-16 [doi]
- A Demonstrative Ad Hoc Attestation SystemEndre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi. 17-30 [doi]
- Property-Based Attestation without a Trusted Third PartyLiqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi. 31-46 [doi]
- The Reduced Address Space (RAS) for Application Memory AuthenticationDavid Champagne, Reouven Elbaz, Ruby B. Lee. 47-63 [doi]
- An Efficient PIR Construction Using Trusted HardwareYanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao. 64-79 [doi]
- Athos: Efficient Authentication of Outsourced File SystemsMichael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos. 80-96 [doi]
- BotTracer: Execution-Based Bot-Like Malware DetectionLei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang. 97-113 [doi]
- Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri NetsRyan Iwahashi, Daniela A. S. de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jin-Tae Oh, Jong-Soo Jang. 114-130 [doi]
- Distinguishing between FE and DDoS Using Randomness CheckHyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng. 131-145 [doi]
- Antisocial Networks: Turning a Social Network into a BotnetElias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos. 146-160 [doi]
- Compromising Anonymity Using Packet SpinningVasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos. 161-174 [doi]
- Behavior-Based Network Access Control: A Proof-of-ConceptVanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis. 175-190 [doi]
- Path-Based Access Control for Enterprise NetworksMatthew Burnside, Angelos D. Keromytis. 191-203 [doi]
- Cryptanalysis of RabbitYi Lu, Huaxiong Wang, San Ling. 204-214 [doi]
- Algebraic Attack on HFE RevisitedJintai Ding, Dieter Schmidt, Fabian Werner. 215-227 [doi]
- Revisiting Wiener s Attack - New Weak Keys in RSASubhamoy Maitra, Santanu Sarkar. 228-243 [doi]
- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash FamilySomitra Kumar Sanadhya, Palash Sarkar. 244-259 [doi]
- Proxy Re-signatures in the Standard ModelSherman S. M. Chow, Raphael C.-W. Phan. 260-276 [doi]
- An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted CombinerPei-Yih Ting, Xiao-Wei Huang. 277-284 [doi]
- Certificate-Based Signature Schemes without Pairings or Random OraclesJoseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou. 285-297 [doi]
- Improved Impossible Differential Attacks on Large-Block RijndaelLei Zhang, Wenling Wu, Je Hong Park, Bon Wook Koo, Yongjin Yeom. 298-315 [doi]
- A Five-Round Algebraic Property of the Advanced Encryption StandardJianyong Huang, Jennifer Seberry, Willy Susilo. 316-330 [doi]
- Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less MultiplicationShay Gueron, Michael E. Kounavis. 331-340 [doi]
- Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype ChipLejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust. 341-354 [doi]
- Collisions for RC4-HashSebastiaan Indesteege, Bart Preneel. 355-366 [doi]
- New Applications of Differential Bounds of the SDS StructureJiali Choy, Khoongming Khoo. 367-384 [doi]
- HAPADEP: Human-Assisted Pure Audio Device PairingClaudio Soriente, Gene Tsudik, Ersin Uzun. 385-400 [doi]
- One-Time Password Access to Any Server without Changing the ServerDinei A. F. Florêncio, Cormac Herley. 401-420 [doi]
- Can Something You Know Be Saved?Baris Coskun, Cormac Herley. 421-440 [doi]
- New Communication-Efficient Oblivious Transfer Protocols Based on PairingsHelger Lipmaa. 441-454 [doi]
- A New (k, n)-Threshold Secret Sharing Scheme and Its ExtensionJun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka. 455-470 [doi]
- Strong Accumulators from Collision-Resistant HashingPhilippe Camacho, Alejandro Hevia, Marcos A. Kiwi, Roberto Opazo. 471-486 [doi]
- A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff DistanceYali Liu, Ken Chiang, Cherita L. Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal. 487-501 [doi]