Abstract is missing.
- An Enhanced Secure Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server EnvironmentsWen-Chung Kuo, Hong-Ji Wei, Yu-Hui Chen, Jiin-Chiou Cheng. 1-5 [doi]
- On the Traceability of the Accountable Anonymous ChannelTomoaki Kosugi, Tomoki Hayafuji, Masahiro Mambo. 6-11 [doi]
- Privacy-Preserved Key Agreement with User AuthenticationChien-Lung Hsu, Tzu-Wei Lin. 12-17 [doi]
- Encrypted Data Deduplication in Cloud StorageChun-I Fan, Shi-Yuan Huang, Wen-Che Hsu. 18-25 [doi]
- Attribute-Based Proxy Re-encryption with Dynamic MembershipChun-I Fan, Chien-Nan Wu, Chun-Hung Chen, Yi-Fan Tseng, Cheng-Chun Feng. 26-32 [doi]
- An Efficient Detection Algorithm for Copy-Move ForgeryChen-Ming Hsu, Jen-Chun Lee, Wei-Kuei Chen. 33-36 [doi]
- The Cryptanalysis of WPA & WPA2 in the Rule-Based Brute Force Attack, an Advanced and Efficient MethodChia-Mei Chen, Tien-Ho Chang. 37-41 [doi]
- De-synchronization Attack on Quadratic Residues-Based RFID Ownership TransferHung-Yu Chien. 42-47 [doi]
- Intelligent Display Auto-Lock Scheme for Mobile DevicesNai-Wei Lo, Chi-Kai Yu, Chao Yang Hsu. 48-54 [doi]
- Hash-Based Anonymous Secure Routing Protocol in Mobile Ad Hoc NetworksNai-Wei Lo, Meng-Chih Chiang, Chao Yang Hsu. 55-62 [doi]
- Secure and Lightweight Authentication Protocol for NFC Tag Based ServicesJonghyun Baek, Heung-Youl Youm. 63-68 [doi]
- Discovery of De-identification Policies Considering Re-identification Risks and Information LossHe-Ming Ruan, Ming-Hwa Tsai, Yennun Huang, Yen-Hua Liao, Chin-Laung Lei. 69-76 [doi]
- Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party ComputationYu Liu, Nasato Goto, Akira Kanaoka, Eiji Okamoto. 77-84 [doi]
- Privacy-Preserving Epidemiological Analysis for a Distributed Database of HospitalsHiroaki Kikuchi, Hideki Hashimoto, Hideo Yasunaga. 85-90 [doi]
- A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud EnvironmentsJheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan. 91-96 [doi]
- Delegation-Based Roaming Payment Protocol with Location and Purchasing Privacy ProtectionChih-Hung Wang, Hsiao Chien Sung. 97-103 [doi]
- Secure Electronic CouponsChin-Chen Chang, Iuon-Chang Lin, Yi-Lun Chi. 104-109 [doi]
- Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge FunctionHakju Kim, Kwangjo Kim. 110-111 [doi]
- Constructions of Fail-Stop Signatures for Multi-signer SettingNobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto. 112-123 [doi]
- A Provable Watermark-Based Copyright Protection SchemePei-Yih Ting, Shao-Da Huang, Tzong-Sun Wu, Han-Yu Lin. 124-129 [doi]
- iF2: An Interpretable Fuzzy Rule Filter for Web Log Post-Compromised Malicious Activity MonitoringChih-Hung Hsieh, Yu-Siang Shen, Chao-Wen Li, Jain-Shing Wu. 130-137 [doi]
- Malware Function Classification Using APIs in Initial BehaviorNaoto Kawaguchi, Kazumasa Omote. 138-144 [doi]
- An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and OpcodeTakashi Adachi, Kazumasa Omote. 145-151 [doi]
- A Proposal for Detecting Distributed Cyber-Attacks Using Automatic ThresholdingYaokai Feng, Yoshiaki Hori, Kouichi Sakurai. 152-159 [doi]