Abstract is missing.
- One-Round Strong Oblivious Signature-Based EnvelopeRongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang. 3-20 [doi]
- Proxy Signature with RevocationShengmin Xu, Guomin Yang, Yi Mu, Sha Ma. 21-36 [doi]
- On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic StructuresArcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione. 37-54 [doi]
- Content-Based EncryptionXiaofen Wang, Yi Mu. 57-72 [doi]
- Provably Secure Threshold Paillier Encryption Based on Hyperplane GeometryZhe Xia, Xiaoyun Yang, Min Xiao, Debiao He. 73-86 [doi]
- Identity-Based Group EncryptionXiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang, Wei Xu, Qianhong Wu. 87-102 [doi]
- Edit Distance Based Encryption and Its ApplicationTran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang. 103-119 [doi]
- Proxy Re-encryption with Delegatable VerifiabilityXiaodong Lin, Rongxing Lu. 120-133 [doi]
- Efficient Completely Non-Malleable and RKA Secure Public Key EncryptionsShifeng Sun, Udaya Parampalli, Tsz Hon Yuen, Yu Yu, Dawu Gu. 134-150 [doi]
- Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing StorageTong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe L. Jiang, Jin Li. 153-169 [doi]
- Public Key Encryption with Authorized Keyword SearchPeng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen. 170-186 [doi]
- Linear Encryption with Keyword SearchShiwei Zhang, Guomin Yang, Yi Mu. 187-203 [doi]
- Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext SecurityKai He, Jian Weng, Man Ho Au, Yijun Mao, Robert H. Deng. 207-222 [doi]
- Anonymous Identity-Based Broadcast Encryption with Revocation for File SharingJianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen. 223-239 [doi]
- Partial Key Exposure Attacks on RSA with Multiple Exponent PairsAtsushi Takayasu, Noboru Kunihiro. 243-257 [doi]
- A New Attack on Three Variants of the RSA CryptosystemMartin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien. 258-268 [doi]
- Generalized Hardness Assumption for Self-bilinear Map with Auxiliary InformationTakashi Yamakawa, Goichiro Hanaoka, Noboru Kunihiro. 269-284 [doi]
- Deterministic Encoding into Twisted Edwards CurvesWei Yu 0008, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian. 285-297 [doi]
- Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQNasour Bagheri, Florian Mendel, Yu Sasaki. 301-316 [doi]
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal StretchChristian Forler, Eik List, Stefan Lucks, Jakob Wenzel. 317-332 [doi]
- Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang FrameworkJiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang. 333-346 [doi]
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO)Kazuhiko Minematsu. 347-362 [doi]
- Impossible Differential Cryptanalysis of 14-Round Camellia-192Keting Jia, Ning Wang. 363-378 [doi]
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEALing Song, Zhangjie Huang, Qianqian Yang. 379-394 [doi]
- On the Security of the LAC Authenticated Encryption AlgorithmJiqiang Lu. 395-408 [doi]
- Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing TechniquesLingyue Qin, Huaifeng Chen, Xiaoyun Wang. 409-424 [doi]
- Reducing the Key Size of the SRP Encryption SchemeDung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi. 427-434 [doi]
- Biometric Access Control with High Dimensional Facial FeaturesYing-Han Pang, Khor Ean Yee, Shih Yin Ooi. 437-445 [doi]
- Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification SchemesShiran Pan, Shen Yan, Wen Tao Zhu. 446-453 [doi]
- Interest Profiling for Security Monitoring and Forensic InvestigationMin Yang, Fei Xu, Kam-Pui Chow. 457-464 [doi]
- Pseudonymous Signature on eIDAS Token - Implementation Based Privacy ThreatsMiroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak. 467-477 [doi]
- A Feasible No-Root Approach on AndroidYao Cheng, Yingjiu Li, Robert H. Deng. 481-489 [doi]
- Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine LearningTimothy Glennan, Christopher Leckie, Sarah M. Erfani. 493-501 [doi]
- A Noiseless Key-Homomorphic PRF: Application on Distributed Storage SystemsJhordany Rodriguez Parra, Terence Chan, Siu-Wai Ho. 505-513 [doi]