Abstract is missing.
- Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problemXiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi. 1-9 [doi]
- Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paperElisa Bertino, Gabriel Ghinita. 10-19 [doi]
- Automatic construction of jump-oriented programming shellcode (on the x86)Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen, Xinchun Yin. 20-29 [doi]
- Jump-oriented programming: a new class of code-reuse attackTyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Zhenkai Liang. 30-40 [doi]
- ROPdefender: a detection tool to defend against return-oriented programming attacksLucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy. 40-51 [doi]
- Identity-based online/offline key encapsulation and encryptionSherman S. M. Chow, Joseph K. Liu, Jianying Zhou. 52-60 [doi]
- Compact identity-based encryption without strong symmetric cipherJoonsang Baek, Jianying Zhou. 61-70 [doi]
- Strongly secure certificateless key exchange without pairingGuomin Yang, Chik-How Tan. 71-79 [doi]
- Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCKCas Cremers. 80-91 [doi]
- Enhancing the trust of internet routing with lightweight route attestationQi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu. 92-101 [doi]
- Network scan detection with LQS: a lightweight, quick and stateful algorithmMansour Alsaleh, Paul C. van Oorschot. 102-113 [doi]
- An integrated approach to cryptographic mitigation of denial-of-service attacksJothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto. 114-123 [doi]
- Boosting the scalability of botnet detection using adaptive traffic samplingJunjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee, Nick Feamster. 124-134 [doi]
- Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracingZhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh. 135-144 [doi]
- Confidentiality-preserving proof theories for distributed proof systemsKazuhiro Minami, Nikita Borisov, Marianne Winslett, Adam J. Lee. 145-154 [doi]
- PUF ROKs: a hardware approach to read-once keysMichael S. Kirkpatrick, Sam Kerr, Elisa Bertino. 155-164 [doi]
- Efficient symbolic automated analysis of administrative attribute-based RBAC-policiesFrancesco Alberti, Alessandro Armando, Silvio Ranise. 165-175 [doi]
- An efficient mobile PACE implementationAlexander Wiesmaier, Moritz Horsch, Johannes Braun 0001, Franziskus Kiefer, Detlef Hühnlein, Falko Strenzke, Johannes Buchmann. 176-185 [doi]
- WebPatrol: automated collection and replay of web-based malware scenariosKevin Zhijie Chen, Guofei Gu, Jianwei Zhuge, Jose Nazario, Xinhui Han. 186-195 [doi]
- Malware propagation in online social networks: nature, dynamics, and defense implicationsGuanhua Yan, Guanling Chen, Stephan Eidenbenz, Nan Li. 196-206 [doi]
- Characterizing kernel malware behavior with kernel data access patternsJunghwan Rhee, Zhiqiang Lin, Dongyan Xu. 207-216 [doi]
- Detecting stealthy malware with inter-structure and imported signaturesBin Liang, Wei You, Wenchang Shi, Zhaohui Liang. 217-227 [doi]
- Secure mobile subscription of sensor-encrypted dataCheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng. 228-237 [doi]
- Efficient audit-based compliance for relational data retentionRagib Hasan, Marianne Winslett. 238-248 [doi]
- Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a callMauro Conti, Irina Zachia-Zlatea, Bruno Crispo. 249-259 [doi]
- Threshold ring signature without random oraclesTsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou. 261-267 [doi]
- On the invisibility of designated confirmer signaturesFubiao Xia, Guilin Wang, Rui Xue. 268-276 [doi]
- Bounded vector signatures and their applicationsLei Wei 0004, Scott E. Coull, Michael K. Reiter. 277-285 [doi]
- Practical affiliation-hiding authentication from improved polynomial interpolationMark Manulis, Bertram Poettering. 286-295 [doi]
- Extended cubes: enhancing the cube attack by extracting low-degree non-linear equationsShekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry. 296-305 [doi]
- Attack on the GridCode one-time passwordIan Molloy, Ninghui Li. 306-315 [doi]
- Rethinking about guessing attacksZhiwei Li, Weichao Wang. 316-325 [doi]
- Formal modelling and automatic detection of resource exhaustion attacksBogdan Groza, Marius Minea. 326-333 [doi]
- A software-based root-of-trust primitive on multicore platformsQiang Yan, Jin Han, Yingjiu Li, Robert H. Deng, Tieyan Li. 334-343 [doi]
- An ontology- and Bayesian-based approach for determining threat probabilitiesStefan Fenz. 344-354 [doi]
- Attacks against process control systems: risk assessment, detection, and responseAlvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, Shankar Sastry. 355-366 [doi]
- Non-uniform distributions in quantitative information-flowMichael Backes, Matthias Berg, Boris Köpf. 367-375 [doi]
- On the security of the identity-based encryption based on DHIES from ASIACCS 2010Willy Susilo, Joonsang Baek. 376-380 [doi]
- How to design space efficient revocable IBE from non-monotonic ABEHuang Lin, Zhenfu Cao, Yuguang Fang, Muxin Zhou, Haojin Zhu. 381-385 [doi]
- Multi-authority ciphertext-policy attribute-based encryption with accountabilityJin Li, Qiong Huang, Xiaofeng Chen 0001, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie. 386-390 [doi]
- 1-out-of-2 signatureMiroslaw Kutylowski, Jun Shao. 391-395 [doi]
- Self-certified ring signaturesNan Li, Yi Mu, Willy Susilo, Fuchun Guo. 396-400 [doi]
- Server-aided signatures verification secure against collusion attackSherman S. M. Chow, Man Ho Au, Willy Susilo. 401-405 [doi]
- Quantified risk-adaptive access control for patient privacy protection in health information systemsQihua Wang, Hongxia Jin. 406-410 [doi]
- EASiER: encryption-based access control in social networks with efficient revocationSonia Jahid, Prateek Mittal, Nikita Borisov. 411-415 [doi]
- Diesel: applying privilege separation to database accessAdrienne Porter Felt, Matthew Finifter, Joel Weinberger, David Wagner. 416-422 [doi]
- Separation of duties as a serviceDavid A. Basin, Samuel J. Burri, Günter Karjoth. 423-429 [doi]
- Receipt-mode trust negotiation: efficient authorization through outsourced interactionsAndrew K. Adams, Adam J. Lee, Daniel Mossé. 430-434 [doi]
- Stronger security model of group key agreementJianjie Zhao, Dawu Gu, M. Choudary Gorantla. 435-440 [doi]
- Leakage resilient eCK-secure key exchange protocol without random oraclesDaisuke Moriyama, Tatsuaki Okamoto. 441-447 [doi]
- Efficient computational oblivious transfer using interactive hashingKirill Morozov, George Savvides. 448-452 [doi]
- Optimal message transmission protocols with flexible parametersReihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Hongsong Shi. 453-458 [doi]
- How to search linear approximation for large non-surjective S-boxYue Sun, Meiqin Wang, Qiumei Sun. 459-465 [doi]
- A new and extended fault analysis on RSACai-Sen Chen, Tao Wang. 466-470 [doi]
- MLAS: multiple level authentication scheme for VANETsTat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li. 471-475 [doi]
- On mouse dynamics as a behavioral biometric for authenticationZach Jorgensen, Ting Yu. 476-482 [doi]
- On the effectiveness of anonymizing networks for web search privacySai Teja Peddinti, Nitesh Saxena. 483-489 [doi]
- Self destructive tamper response for software protectionKazuomi Oishi, Tsutomu Matsumoto. 490-496 [doi]
- Deriving common malware behavior through graph clusteringYoung Hee Park, Douglas S. Reeves. 497-502 [doi]
- Towards a binary integrity system for windowsYongzheng Wu, Roland H. C. Yap. 503-507 [doi]
- A statistical approach to botnet virulence estimationJulian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani. 508-512 [doi]