Abstract is missing.
- Defeating Plausible Deniability of VeraCrypt Hidden Operating SystemsMichal Kedziora, Yang-Wai Chow, Willy Susilo. 3-13 [doi]
- Security Analysis of a Design Variant of Randomized HashingPraveen Gauravaram, Shoichi Hirose, Douglas Stebila. 14-22 [doi]
- Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data TransferMohammad Hossein Yalame, Mohammad Hossein Farzam, Siavash Bayat Sarmadi. 23-34 [doi]
- An Efficient Non-transferable Proxy Re-encryption SchemeS. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan. 35-47 [doi]
- Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of NonceWenjie Qin, Kewei Lv. 48-57 [doi]
- On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AESSourya Kakarla, Srinath Mandava, Dhiman Saha, Dipanwita Roy Chowdhury. 58-72 [doi]
- Private Distributed Three-Party Learning of Gaussian Mixture ModelsKaleb L. Leemaqz, Sharon X. Lee, Geoffrey J. McLachlan. 75-87 [doi]
- A Privacy Preserving Platform for MapReduceSibghat Ullah Bazai, Julian Jang-Jaccard, Xuyun Zhang. 88-99 [doi]
- Privacy-Preserving Deep Learning: Revisited and EnhancedLe Trieu Phong, Yoshinori Aono, Takuya Hayashi 0001, Lihua Wang, Shiho Moriai. 100-110 [doi]
- Characterizing Promotional Attacks in Mobile App StoreBo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori. 113-127 [doi]
- Low-Data Complexity Attacks on CamelliaTakeru Koie, Takanori Isobe, Yosuke Todo, Masakatu Morii. 128-140 [doi]
- RESTful Is Not SecureTetiana Yarygina. 141-153 [doi]
- UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet SpaceRuibin Zhang, Chi Yang, Shaoning Pang, Hossein Sarrafzadeh. 157-168 [doi]
- A Hybrid Approach for Malware Family ClassificationNaqqash Aman, Yasir Saleem, Fahim H. Abbasi, Farrukh Shahzad. 169-180 [doi]
- Low-Complexity Signature-Based Malware Detection for IoT DevicesMuhamed Fauzi Bin Abbas, Thambipillai Srikanthan. 181-189 [doi]
- De-anonymous and Anonymous Technologies for Network Traffic ReleaseXiang Tian, Yu Wang, Yujia Zhu, Yong Sun, Qingyun Liu. 193-200 [doi]
- Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning SystemsSang Guun Yoo, Jhonattan J. Barriga. 201-213 [doi]
- On the Effectiveness of Non-readable Executable Memory Against BROPChristian Otterstad. 214-221 [doi]