Abstract is missing.
- Improved Collision Attacks on the Reduced-Round Grøstl Hash FunctionKota Ideguchi, Elmar Tischhauser, Bart Preneel. 1-16 [doi]
- Improved Distinguishing Attack on RabbitYi Lu 0002, Yvo Desmedt. 17-23 [doi]
- Cryptanalysis of the Convex Hull Click Human Identification ProtocolHassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang. 24-30 [doi]
- An Analysis of DepenDNSNadhem J. AlFardan, Kenneth G. Paterson. 31-38 [doi]
- Security Reductions of the Second Round SHA-3 CandidatesElena Andreeva, Bart Mennink, Bart Preneel. 39-53 [doi]
- Security Analysis of the Extended Access Control Protocol for Machine Readable Travel DocumentsÖzgür Dagdelen, Marc Fischlin. 54-68 [doi]
- Revisiting the Security of the Alred DesignMarcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho. 69-83 [doi]
- Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile DevicesChristian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter. 84-98 [doi]
- Implicit Authentication through Learning User BehaviorElaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow. 99-113 [doi]
- Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor GroupsJonathan T. Trostle, Andy Parrish. 114-128 [doi]
- Video Streaming Forensic - Content Identification with Traffic SnoopingYali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee. 129-135 [doi]
- Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input SetsGeorg Neugebauer, Ulrike Meyer, Susanne Wetzel. 136-151 [doi]
- Enhancing Security and Privacy in Certified Mail Systems Using Trust Domain SeparationArne Tauber, Thomas Rössler. 152-158 [doi]
- Privacy-Preserving ECC-Based Grouping Proofs for RFIDLejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede. 159-165 [doi]
- Artificial Malware Immunization Based on Dynamically Assigned Sense of SelfXinyuan Wang, Xuxian Jiang. 166-180 [doi]
- Misleading Malware Similarities Analysis by Automatic Data Structure ObfuscationZhi-Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie. 181-195 [doi]
- Crimeware Swindling without Virtual MachinesVasilis Pappas, Brian M. Bowen, Angelos D. Keromytis. 196-202 [doi]
- An Architecture for Enforcing JavaScript Randomization in Web2.0 ApplicationsElias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos. 203-209 [doi]
- Summary-Invisible Networking: Techniques and DefensesLei Wei, Michael K. Reiter, Ketan Mayer-Patel. 210-225 [doi]
- Selective Regular Expression MatchingNatalia Stakhanova, Hanli Ren, Ali A. Ghorbani. 226-240 [doi]
- Traceability of Executable Codes Using Neural Networks Davidson R. Boccardo, Tiago M. Nascimento, Raphael C. Machado, Charles B. Prado, Luiz F. R. C. Carmo. 241-253 [doi]
- On Side-Channel Resistant Block Cipher UsageJorge Guajardo, Bart Mennink. 254-268 [doi]
- Security Implications of Crosstalk in Switching CMOS GatesGeir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes. 269-275 [doi]
- On Privacy Leakage through Silence SuppressionYe Zhu. 276-282 [doi]
- One-Time Trapdoor One-Way FunctionsJulien Cathalo, Christophe Petit. 283-298 [doi]
- Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH AssumptionMayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento. 299-306 [doi]
- A Short Signature Scheme from the RSA FamilyPing Yu, Rui Xue. 307-318 [doi]
- Efficient Message Space Extension for Automorphic SignaturesMasayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo. 319-330 [doi]
- CRePE: Context-Related Policy Enforcement for AndroidMauro Conti, Vu Thien Nga Nguyen, Bruno Crispo. 331-345 [doi]
- Privilege Escalation Attacks on AndroidLucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy. 346-360 [doi]
- Walk the Walk: Attacking Gait Biometrics by ImitationBendik B. Mjaaland, Patrick Bours, Danilo Gligoroski. 361-380 [doi]
- Efficient Multiplicative Homomorphic E-VotingKun Peng, Feng Bao. 381-393 [doi]
- Double Spending Protection for E-Cash Based on Risk ManagementPatricia Everaere, Isabelle Simplot-Ryl, Issa Traoré. 394-408 [doi]
- Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow AttacksDonghai Tian, Xi Xiong, Changzhen Hu, Peng Liu. 409-415 [doi]
- Deciding Recognizability under Dolev-Yao Intruder ModelZhiwei Li, Weichao Wang. 416-429 [doi]
- Indifferentiable Security Reconsidered: Role of SchedulingKazuki Yoneyama. 430-444 [doi]