116 | -- | 129 | Adel El-Atawy, Qi Duan, Ehab Al-Shaer. A Novel Class of Robust Covert Channels Using Out-of-Order Packets |
130 | -- | 144 | AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot. CPV: Delay-Based Location Verification for the Internet |
145 | -- | 157 | Hyungon Moon, HoJoon Lee, Ingoo Heo, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang. Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping |
158 | -- | 171 | Andrei Homescu, Todd Jackson, Stephen Crane, Stefan Brunthaler, Per Larsen, Michael Franz. Large-Scale Automated Software Diversity - Program Evolution Redux |
172 | -- | 184 | James W. Anderson, Hein Meling, Alexander Rasmussen, Amin Vahdat, Keith Marzullo. Local Recovery for High Availability in Strongly Consistent Cloud Services |
185 | -- | 198 | Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia. cloud-Tree: Authenticated Index for Verifiable Cloud Service Selection |
199 | -- | 210 | Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, Xiaolin Li 0001. My Privacy My Decision: Control of Photo Sharing on Online Social Networks |
211 | -- | 220 | Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan. Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices |
221 | -- | 234 | Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer, Mohamed Shehab. Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids |