Abstract is missing.
- Inferring Protocol State Machine from Network Traces: A Probabilistic ApproachYipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo. 1-18 [doi]
- A Specification Based Intrusion Detection Framework for Mobile PhonesAshwin Chaugule, Zhi Xu, Sencun Zhu. 19-37 [doi]
- Misuse Detection in Consent-Based NetworksMansoor Alicherry, Angelos D. Keromytis. 38-56 [doi]
- Cold Boot Key Recovery by Solving Polynomial Systems with NoiseMartin Albrecht, Carlos Cid. 57-72 [doi]
- Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level SecurityWerner Schindler, Kouichi Itoh. 73-90 [doi]
- Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRFAlex Biryukov, Ilya Kizhvatov, Bin Zhang. 91-109 [doi]
- Cache Timing Analysis of RC4Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux. 110-129 [doi]
- Secure Efficient Multiparty Computing of Multivariate Polynomials and ApplicationsDana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung. 130-146 [doi]
- Private Discovery of Common Social ContactsEmiliano De Cristofaro, Mark Manulis, Bertram Poettering. 147-165 [doi]
- Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of TransparencyHenrich Christopher Pöhls, Kai Samelin, Joachim Posegga. 166-182 [doi]
- Double-Trapdoor Anonymous Tags for Traceable SignaturesMasayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo. 183-200 [doi]
- Hierarchical Identity-Based Chameleon Hash and Its ApplicationsFeng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao. 201-219 [doi]
- Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user SettingDaiki Chiba, Takahiro Matsuda 0002, Jacob C. N. Schuldt, Kanta Matsuura. 220-237 [doi]
- Quantitatively Analyzing Stealthy Communication ChannelsPatrick Butler, Kui Xu, Danfeng (Daphne) Yao. 238-254 [doi]
- Fully Non-interactive Onion Routing with Forward-SecrecyDario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi. 255-273 [doi]
- Generic Fully Simulatable Adaptive Oblivious TransferKaoru Kurosawa, Ryo Nojima, Le Trieu Phong. 274-291 [doi]
- Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized AdversaryAshish Choudhury, Kaoru Kurosawa, Arpita Patra. 292-308 [doi]
- Relaxed Security Notions for Signatures of KnowledgeMarc Fischlin, Cristina Onete. 309-326 [doi]
- LBlock: A Lightweight Block CipherWenling Wu, Lei Zhang 0012. 327-344 [doi]
- On Hiding a Plaintext Length by PreencryptionCihangir Tezcan, Serge Vaudenay. 345-358 [doi]
- Fighting Pirates 2.0Paolo D Arco, Angel L. Pérez del Pozo. 359-376 [doi]
- Security Notions for Broadcast EncryptionDuong Hieu Phan, David Pointcheval, Mario Strefler. 377-394 [doi]
- Towards User-Friendly Credential Transfer on Open Credential PlatformsKari Kostiainen, N. Asokan, Alexandra Afanasyeva. 395-412 [doi]
- Non-transferable User Certification Secure against Authority Information Leaks and Impersonation AttacksJacob C. N. Schuldt, Goichiro Hanaoka. 413-430 [doi]
- Composable Security Analysis of OS ServicesRan Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Venema. 431-448 [doi]
- Practical Attacks on the Maelstrom-0 Compression FunctionStefan Kölbl, Florian Mendel. 449-461 [doi]
- Linear Analysis of Reduced-Round CubeHashTomer Ashur, Orr Dunkelman. 462-478 [doi]
- On the Indifferentiability of Fugue and LuffaRishiraj Bhattacharyya, Avradip Mandal. 479-497 [doi]
- Analysis of Message Injection in Stream Cipher-Based Hash FunctionsYuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto. 498-513 [doi]
- Secure Authenticated ComparisonsKeith B. Frikken, Hao Yuan, Mikhail J. Atallah. 514-531 [doi]
- Public-Key Encryption with Delegated SearchLuan Ibraimi, Svetla Nikova, Pieter H. Hartel, Willem Jonker. 532-549 [doi]