Abstract is missing.
- Security Analysis of a Multi-factor Authenticated Key Exchange ProtocolFeng Hao, Dylan Clarke. 1-11 [doi]
- Breaking an Animated CAPTCHA SchemeVu Duc Nguyen, Yang-Wai Chow, Willy Susilo. 12-29 [doi]
- Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware TokensAssaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung. 30-47 [doi]
- RIKE: Using Revocable Identities to Support Key Escrow in PKIsNan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao. 48-65 [doi]
- TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory AttacksTilo Müller, Benjamin Taubmann, Felix C. Freiling. 66-83 [doi]
- Authenticated Encryption: How Reordering Can Impact PerformanceBasel Alomair. 84-99 [doi]
- Length-Doubling Ciphers and Tweakable CiphersHaibin Zhang. 100-116 [doi]
- Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block CiphersWentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu. 117-134 [doi]
- Security Enhancements by OR-Proof in Identity-Based IdentificationAtsushi Fujioka, Taiichi Saito, Keita Xagawa. 135-152 [doi]
- Identity-Based Extractable Hash Proofs and Their ApplicationsYu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao. 153-170 [doi]
- On Structural Signatures for Tree Data StructuresKai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer. 171-187 [doi]
- Inner-Product Lossy Trapdoor Functions and ApplicationsXiang Xie, Rui Xue, Rui Zhang 0002. 188-205 [doi]
- On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security AmplificationAfonso Arriaga, Manuel Barbosa, Pooya Farshim. 206-223 [doi]
- Secure Accumulators from Euclidean Rings without Trusted SetupHelger Lipmaa. 224-240 [doi]
- Linear Fault Analysis of Block CiphersZhiqiang Liu, Dawu Gu, Ya Liu 0001, Wei Li 0013. 241-256 [doi]
- Cryptanalysis of 256-Bit Key HyRAL via Equivalent KeysYuki Asano, Shingo Yanagihara, Tetsu Iwata. 257-274 [doi]
- Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression FunctionsYu Sasaki, Lei Wang 0007. 275-292 [doi]
- Zero-Value Point Attacks on Kummer-Based CryptosystemFangguo Zhang, Qiping Lin, Shengli Liu. 293-310 [doi]
- PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel ResistanceGilles Piret, Thomas Roche, Claude Carlet. 311-328 [doi]
- Wide Collisions in PracticeXin Ye, Thomas Eisenbarth. 329-343 [doi]
- A General Construction for 1-Round δ-RMT and (0, δ)-SMTReihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang. 344-362 [doi]
- A Prefiltering Approach to Regular Expression Matching for Network Security SystemsTingwen Liu, Yong Sun, Alex X. Liu, Li Guo, Binxing Fang. 363-380 [doi]
- iHTTP: Efficient Authentication of Non-confidential HTTP TrafficJason Gionta, Peng Ning, Xiaolan Zhang. 381-399 [doi]
- ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request CachesElias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, Evangelos P. Markatos. 400-417 [doi]
- Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy ViolationsMinh Tran, Xinshu Dong, Zhenkai Liang, Xuxian Jiang. 418-435 [doi]
- The Shy Mayor: Private Badges in GeoSocial NetworksBogdan Carbunar, Radu Sion, Rahul Potharaju, Moussa Ehsan. 436-454 [doi]
- Detecting Social Spam Campaigns on TwitterZi Chu, Indra Widjaja, Haining Wang. 455-472 [doi]
- A New Framework for Privacy of RFID Path AuthenticationShaoying Cai, Robert H. Deng, Yingjiu Li, Yunlei Zhao. 473-488 [doi]
- GHB #: A Provably Secure HB-Like Lightweight Authentication ProtocolPanagiotis Rizomiliotis, Stefanos Gritzalis. 489-506 [doi]
- Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the CloudBoyang Wang, Baochun Li, Hui Li. 507-525 [doi]
- SPICE - Simple Privacy-Preserving Identity-Management for Cloud EnvironmentSherman S. M. Chow, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu. 526-543 [doi]
- A Practical Smart Metering System Supporting Privacy Preserving Billing and Load MonitoringHsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin. 544-560 [doi]
- Private Computation of Spatial and Temporal Power Consumption with Smart MetersZekeriya Erkin, Gene Tsudik. 561-577 [doi]