Abstract is missing.
- Analysis of Toeplitz MDS MatricesSumanta Sarkar, Habeeb Syed. 3-18 [doi]
- Reforgeability of Authenticated Encryption SchemesChristian Forler, Eik List, Stefan Lucks, Jakob Wenzel. 19-37 [doi]
- Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward OperationsYusuke Naito. 38-57 [doi]
- FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and SchedulabilityFan Jiang, Cen Zhang, Shaoyin Cheng. 61-79 [doi]
- Splitting Third-Party Libraries' Privileges from Android AppsJiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang, Yingjiao Niu. 80-94 [doi]
- SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow HijackingYan Lin, Xiaoxiao Tang, Debin Gao. 95-112 [doi]
- Prover Efficient Public Verification of Dense or Sparse/Structured Matrix-Vector MultiplicationJean-Guillaume Dumas, Vincent Zucca. 115-134 [doi]
- JSFfox: Run-Timely Confining JavaScript for FirefoxWeizhong Qiang, JiaZhen Guo, Hai Jin, Weifeng Li. 135-150 [doi]
- PriMal: Cloud-Based Privacy-Preserving Malware DetectionHao Sun, Jinshu Su, Xiaofeng Wang, Rongmao Chen, Yujing Liu, Qiaolin Hu. 153-172 [doi]
- A New Malware Classification Approach Based on Malware Dynamic AnalysisYing Fang, Bo Yu, Yong Tang, Liu Liu, Zexin Lu, Yi Wang, Qiang Yang. 173-189 [doi]
- Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple AssumptionsKeita Emura. 193-213 [doi]
- Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter DataMitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu, Ye Wang. 214-234 [doi]
- Private Graph Intersection ProtocolFucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu, Su Peng. 235-248 [doi]
- Computing Aggregates Over Numeric Data with Personalized Local Differential PrivacyMousumi Akter, Tanzima Hashem. 249-260 [doi]
- An Efficient Toolkit for Computing Private Set OperationsAlex Davidson, Carlos Cid. 261-278 [doi]
- Privacy-Preserving k-time Authenticated Secret HandshakesYangguang Tian, Shiwei Zhang, Guomin Yang, Yi Mu, Yong Yu. 281-300 [doi]
- Exploring Effect of Location Number on Map-Based Graphical Password AuthenticationWeizhi Meng, Lee Wang Hao, Man Ho Au, Zhe Liu. 301-313 [doi]
- A QR Code Watermarking Approach Based on the DWT-DCT TechniqueYang-Wai Chow, Willy Susilo, Joseph Tonien, Wei Zong. 314-331 [doi]
- Generating Complete Edwards CurvesTheo Fanuela Prabowo, Chik-How Tan. 335-348 [doi]
- Secure GLS Recomposition for Sum-of-Square CofactorsEunkyung Kim 0002, Mehdi Tibouchi. 349-365 [doi]
- Differential Addition on Twisted Edwards CurvesReza Rezaeian Farashahi, Seyed Gholamhossein Hosseini. 366-378 [doi]
- Certificate Transparency with Enhancements and Short ProofsAbhishek Singh, Binanda Sengupta, Sushmita Ruj. 381-389 [doi]
- Update-Tolerant and Revocable Password BackupMoritz Horsch, Johannes Braun 0001, Dominique Metz, Johannes A. Buchmann. 390-397 [doi]
- Redactable Graph Hashing, Revisited - (Extended Abstract)Andreas Erwig, Marc Fischlin, Martin Hald, Dominik Helm, Robert Kiel, Florian Kübler, Michael Kümmerlin, Jakob Laenge, Felix Rohrbach. 398-405 [doi]
- On the Security of Designing a Cellular Automata Based Stream CipherSwapan Maiti, Shamit Ghosh, Dipanwita Roy Chowdhury. 406-413 [doi]
- StegogamesClark D. Thomborson, Marc Jeanmougin. 414-421 [doi]
- A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked WishesDwight Horne, Suku Nair. 422-434 [doi]
- Fully Context-Sensitive CFI for COTS BinariesWeizhong Qiang, Yingda Huang, Deqing Zou, Hai Jin, Shizhen Wang, Guozhong Sun. 435-442 [doi]
- Dual-Mode Cryptosystem Based on the Learning with Errors ProblemJingnan He, Wenpan Jing, Bao Li, Xianhui Lu, Dingding Jia. 443-451 [doi]
- Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical InfrastructureNicholas R. Rodofile, Thomas Schmidt, Sebastian T. Sherry, Christopher Djamaludin, Kenneth Radke, Ernest Foo. 452-459 [doi]
- Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification SchemeJason H. M. Ying, Noboru Kunihiro. 460-467 [doi]