Abstract is missing.
- Privacy-Friendly Access Control Based on Personal AttributesJan Hajny, Lukas Malina, Ondrej Tethal. 1-16 [doi]
- Are You Threatening My Hazards?Marina Krotofil, Jason Larsen. 17-32 [doi]
- Complicating Process Identification by Replacing Process Information for Attack AvoidanceMasaya Sato, Toshihiro Yamauchi. 33-47 [doi]
- Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth BreakpointsKuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara, Toshiaki Ishiyama. 48-61 [doi]
- Key Management for Onion Routing in a True Peer to Peer SettingPaolo Palmieri 0001, Johan A. Pouwelse. 62-71 [doi]
- Cheater Identifiable Secret Sharing Schemes via Multi-Receiver AuthenticationRui Xu, Kirill Morozov, Tsuyoshi Takagi. 72-87 [doi]
- Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite FieldSatoshi Obana, Kazuya Tsuchida. 88-97 [doi]
- Secure Multi-Party Computation for Elliptic CurvesKoutarou Suzuki, Kazuki Yoneyama. 98-108 [doi]
- More Constructions of Re-splittable Threshold Public Key EncryptionSatsuya Ohata, Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura. 109-118 [doi]
- How to Effectively Decrease the Resource Requirement in Template Attack?Hailong Zhang. 119-133 [doi]
- Deterministic Hard Fault Attack on TriviumAvijit Dutta, Goutam Paul. 134-145 [doi]
- DPA Resilience of Rotation-Symmetric S-boxesMuhammet Ali Evci, Selçuk Kavut. 146-157 [doi]
- A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse EngineeringDai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, Naoya Torii. 158-173 [doi]
- Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large CharacteristicsYun-An Chang, Wei-Chih Hong, Ming-Chun Hsiao, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng. 174-186 [doi]
- On the Security Proof of an Authentication Protocol from Eurocrypt 2011Kosei Endo, Noboru Kunihiro. 187-203 [doi]
- Improved Linear Cryptanalysis of Reduced-Round MIBSAsli Bay, Jialin Huang, Serge Vaudenay. 204-220 [doi]
- Characterization of EME with Linear MixingNilanjan Datta, Mridul Nandi. 221-239 [doi]
- Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion on Twistable Ate Pairing and Its DifficultyShoichi Akagi, Yasuyuki Nogami. 240-249 [doi]
- Related Key Secure PKE from Hash Proof SystemsDingding Jia, Bao Li, Xianhui Lu, Qixiang Mei. 250-265 [doi]
- Towards Symmetric Functional Encryption for Regular Languages with Predicate PrivacyFu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin. 266-275 [doi]
- Framework for Efficient Search and Statistics Computation on Encrypted Cloud DataSanjit Chatterjee, Sayantan Mukherjee. 276-285 [doi]