Abstract is missing.
- Attacking cryptographic schemes based on perturbation polynomials Martin Albrecht, Craig Gentry, Shai Halevi, Jonathan Katz. 1-10 [doi]
- Filter-resistant code injection on ARMYves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter. 11-20 [doi]
- False data injection attacks against state estimation in electric power gridsYao Liu, Michael K. Reiter, Peng Ning. 21-32 [doi]
- EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyondKarl Koscher, Ari Juels, Vjekoslav Brajkovic, Tadayoshi Kohno. 33-42 [doi]
- An efficient forward private RFID protocolCôme Berbain, Olivier Billet, Jonathan Etrog, Henri Gilbert. 43-53 [doi]
- RFID privacy: relation between two notions, minimal condition, and efficient constructionChangshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li. 54-65 [doi]
- CoSP: a general framework for computational soundness proofsMichael Backes, Dennis Hofheinz, Dominique Unruh. 66-78 [doi]
- Reactive noninterferenceAaron Bohannon, Benjamin C. Pierce, Vilhelm Sjöberg, Stephanie Weirich, Steve Zdancewic. 79-90 [doi]
- Computational soundness for key exchange protocols with symmetric encryptionRalf Küsters, Max Tuengerthal. 91-100 [doi]
- A probabilistic approach to hybrid role miningMario Frank, Andreas P. Streich, David A. Basin, Joachim M. Buhmann. 101-111 [doi]
- Efficient pseudorandom functions from the decisional linear assumption and weaker variantsAllison B. Lewko, Brent Waters. 112-120 [doi]
- Improving privacy and security in multi-authority attribute-based encryptionMelissa Chase, Sherman S. M. Chow. 121-130 [doi]
- Oblivious transfer with access controlJan Camenisch, Maria Dubovitskaya, Gregory Neven. 131-140 [doi]
- NISAN: network information service for anonymization networksAndriy Panchenko, Stefan Richter, Arne Rache. 141-150 [doi]
- Certificateless onion routingDario Catalano, Dario Fiore, Rosario Gennaro. 151-160 [doi]
- ShadowWalker: peer-to-peer anonymous communication using redundant structured topologiesPrateek Mittal, Nikita Borisov. 161-172 [doi]
- Ripley: automatically securing web 2.0 applications through replicated executionK. Vikram, Abhishek Prateek, V. Benjamin Livshits. 173-186 [doi]
- HAIL: a high-availability and integrity layer for cloud storageKevin D. Bowers, Ari Juels, Alina Oprea. 187-198 [doi]
- Hey, you, get off of my cloud: exploring information leakage in third-party compute cloudsThomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage. 199-212 [doi]
- Dynamic provable data possessionC. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia. 213-222 [doi]
- On cellular botnets: measuring the impact of malicious devices on a cellular network corePatrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick Drew McDaniel, Thomas F. La Porta. 223-234 [doi]
- On lightweight mobile phone application certificationWilliam Enck, Machigar Ongtang, Patrick Drew McDaniel. 235-245 [doi]
- SMILE: encounter-based trust for mobile social servicesJustin Manweiler, Ryan Scudellari, Landon P. Cox. 246-255 [doi]
- Battle of Botcraft: fighting bots in online games with human observational proofsSteven Gianvecchio, Zhenyu Wu, Mengjun Xie, Haining Wang. 256-268 [doi]
- Fides: remote anomaly-based cheat detection using client emulationEdward C. Kaiser, Wu-chang Feng, Travis Schluessler. 269-279 [doi]
- Behavior based software theft detectionXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu. 280-290 [doi]
- The fable of the bees: incentivizing robust revocation decision making in ad hoc networksSteffen Reidt, Mudhakar Srivatsa, Shane Balfe. 291-302 [doi]
- Effective implementation of the cell broadband engine:::TM::: isolation loaderMasana Murase, Kanna Shimizu, Wilfred Plouffe, Masaharu Sakamoto. 303-313 [doi]
- On achieving good operating points on an ROC plane using stochastic anomaly score predictionMuhammad Qasim Ali, Hassan Khan, Ali Sajjad, Syed Ali Khayam. 314-323 [doi]
- On non-cooperative location privacy: a game-theoretic analysisJulien Freudiger, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, David C. Parkes. 324-337 [doi]
- Privacy-preserving genomic computation through program specializationRui Wang, Xiaofeng Wang, Zhou Li, Haixu Tang, Michael K. Reiter, Zheng Dong. 338-347 [doi]
- Feeling-based location privacy protection for location-based servicesToby Xu, Ying Cai. 348-357 [doi]
- Multi-party off-the-record messagingIan Goldberg, Berkant Ustaoglu, Matthew Van Gundy, Hao Chen. 358-368 [doi]
- The bayesian traffic analysis of mix networksCarmela Troncoso, George Danezis. 369-379 [doi]
- As-awareness in Tor path selectionMatthew Edman, Paul F. Syverson. 380-389 [doi]
- Membership-concealing overlay networksEugene Y. Vasserman, Rob Jansen, James Tyra, Nicholas Hopper, Yongdae Kim. 390-399 [doi]
- On the difficulty of software-based attestation of embedded devicesClaude Castelluccia, Aurélien Francillon, Daniele Perito, Claudio Soriente. 400-409 [doi]
- Proximity-based access control for implantable medical devicesKasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun. 410-419 [doi]
- XCS: cross channel scripting and its impact on web applicationsHristo Bojinov, Elie Bursztein, Dan Boneh. 420-431 [doi]
- A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanismsCédric Fournet, Gurvan Le Guernic, Tamara Rezk. 432-441 [doi]
- Finding bugs in exceptional situations of JNI programsSiliang Li, Gang Tan. 442-452 [doi]
- Secure open source collaboration: an empirical study of linus lawAndrew Meneely, Laurie A. Williams. 453-462 [doi]
- On voting machine design for verification and testabilityCynthia Sturton, Susmit Jha, Sanjit A. Seshia, David Wagner. 463-476 [doi]
- Secure in-VM monitoring using hardware virtualizationMonirul I. Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi. 477-487 [doi]
- A metadata calculus for secure information sharingMudhakar Srivatsa, Dakshi Agrawal, Steffen Reidt. 488-499 [doi]
- Multiple password interference in text passwords and click-based graphical passwordsSonia Chiasson, Alain Forget, Elizabeth Stobert, Paul C. van Oorschot, Robert Biddle. 500-511 [doi]
- Can they hear me now?: a security analysis of law enforcement wiretapsMicah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, Matt Blaze. 512-523 [doi]
- English shellcodeJoshua Mason, Sam Small, Fabian Monrose, Greg MacManus. 524-533 [doi]
- Learning your identity and disease from research papers: information leaks in genome wide association studyRui Wang, Yong Fuga Li, Xiaofeng Wang, Haixu Tang, Xiao-yong Zhou. 534-544 [doi]
- Countering kernel rootkits with lightweight hook protectionZhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning. 545-554 [doi]
- Mapping kernel objects to enable systematic integrity checkingMartim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang. 555-565 [doi]
- Robust signatures for kernel data structuresBrendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon T. Giffin. 566-577 [doi]
- A new cell counter based attack against torZhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xuan, Weijia Jia. 578-589 [doi]
- Scalable onion routing with torskJon McLachlan, Andrew Tran, Nicholas Hopper, Yongdae Kim. 590-599 [doi]
- Anonymous credentials on a standard java cardPatrik Bichsel, Jan Camenisch, Thomas Groß, Victor Shoup. 600-610 [doi]
- Large-scale malware indexing using function-call graphsXin Hu, Tzi-cker Chiueh, Kang G. Shin. 611-620 [doi]
- Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineeringJuan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Xiaodong Song. 621-634 [doi]
- Your botnet is my botnet: analysis of a botnet takeoverBrett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna. 635-647 [doi]