Abstract is missing.
- Protection, usability and improvements in reflected XSS filtersRiccardo Pelizzi, R. Sekar. 5 [doi]
- An independent validation of vulnerability discovery modelsViet Hung Nguyen, Fabio Massacci. 6-7 [doi]
- Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced securityYinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen, Xitao Wen. 8-9 [doi]
- Memoirs of a browser: a cross-browser detection model for privacy-breaching extensionsCristiano Giuffrida, Stefano Ortolani, Bruno Crispo. 10-11 [doi]
- FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applicationsSteven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens. 12-13 [doi]
- Ciphertext policy attribute-based encryption from latticesJiang Zhang, Zhenfeng Zhang, Aijun Ge. 16-17 [doi]
- Expressive CP-ABE with partially hidden access structuresJunzuo Lai, Robert H. Deng, Yingjiu Li. 18-19 [doi]
- New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphersKhoongming Khoo, Chik-How Tan. 20-21 [doi]
- An efficient broadcast attack against NTRUJianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu. 22-23 [doi]
- Forgery-resilience for digital signature schemesAtefeh Mashatan, Khaled Ouafi. 24-25 [doi]
- Verifier-local revocation group signatures with time-bound keysCheng-Kang Chu, Joseph K. Liu, Xinyi Huang, Jianying Zhou. 26-27 [doi]
- An identity authentication protocol in online social networksLingjun Li, Xinxin Zhao, Guoliang Xue. 28-29 [doi]
- Adding query privacy to robust DHTsMichael Backes, Ian Goldberg, Aniket Kate, Tomas Toft. 30-31 [doi]
- k-anonymization meets differential privacyNinghui Li, Wahbeh H. Qardaji, Dong Su. 32-33 [doi]
- Privacy-preserving alibi systemsBenjamin Davis, Hao Chen, Matthew K. Franklin. 34-35 [doi]
- On the mixing time of directed social graphs and security implicationsAbedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim. 36-37 [doi]
- Recursive partitioning and summarization: a practical framework for differentially private data publishingWahbeh H. Qardaji, Ninghui Li. 38-39 [doi]
- Private and oblivious set and multiset operationsMarina Blanton, Everaldo Aguiar. 40-41 [doi]
- Practical client puzzles in the standard modelLakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto. 42-43 [doi]
- Towards the attacker's view of protocol narrations (or, how to compile security protocols)Zhiwei Li, Weichao Wang. 44-45 [doi]
- Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious modelDaniel A. Mayer, Susanne Wetzel. 46-47 [doi]
- CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platformsAmit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn. 48-49 [doi]
- CloudER: a framework for automatic software vulnerability location and patching in the cloudPing Chen, Dongyan Xu, Bing Mao. 50 [doi]
- Monetizing spambot activity and understanding its relation with spambot traffic featuresSyed Fida Gillani, Ehab Al-Shaer, Sardar Ali, Syed Ali Khayam. 51-52 [doi]
- Carving secure wi-fi zones with defensive jammingYu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim. 53-54 [doi]
- Keeping identity secret in online social networksXinxin Zhao, Lingjun Li, Guoliang Xue. 55-56 [doi]
- Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud softwareYevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung. 57-58 [doi]
- Security implications in Kerberos by the introduction of smart cardsNikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel. 59-60 [doi]
- KoNKS: konsensus-style network koordinate systemEric Chan-Tin, Nicholas Hopper. 61-62 [doi]
- User-level secure deletion on log-structured file systemsJoel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin. 63-64 [doi]
- ClusterFA: a memory-efficient DFA structure for network intrusion detectionLei Jiang, Jianlong Tan, Yanbing Liu. 65-66 [doi]
- Discovering records of private VoIP calls without wiretappingChang-Han Jong, Virgil D. Gligor. 67-68 [doi]
- Adaptive semi-private email aliasesBeng Heng Ng, Alexander Crowell, Atul Prakash. 69-70 [doi]
- AdDroid: privilege separation for applications and advertisers in AndroidPaul Pearce, Adrienne Porter Felt, Gabriel Nunez, David Wagner. 71-72 [doi]
- Constraint-enhanced role engineering via answer set programmingJinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang. 73-74 [doi]
- Integrity walls: finding attack surfaces from mandatory access control policiesHayawardh Vijayakumar, Guruprasad Jakka, Sandra Rueda, Joshua Schiffman, Trent Jaeger. 75-76 [doi]
- The specification and compilation of obligation policies for program monitoringCheng Xu, Philip W. L. Fong. 77-78 [doi]
- Towards efficient proofs of retrievabilityJia Xu, Ee-Chien Chang. 79-80 [doi]
- Boosting efficiency and security in proof of ownership for deduplicationRoberto Di Pietro, Alessandro Sorniotti. 81-82 [doi]
- Secure cloud maintenance: protecting workloads against insider attacksSören Bleikertz, Anil Kurmus, Zoltán A. Nagy, Matthias Schunter. 83-84 [doi]
- Outsourced private set intersection using homomorphic encryptionFlorian Kerschbaum. 85-86 [doi]
- CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloudLei Xu, Xiaoxin Wu, Xinwen Zhang. 87-88 [doi]
- A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniquesTzipora Halevi, Nitesh Saxena. 89-90 [doi]
- Letting applications operate through attacks launched from compromised driversShengzhi Zhang, Peng Liu 0005. 91-92 [doi]
- Software decoys for insider threatYoung Hee Park, Salvatore J. Stolfo. 93-94 [doi]
- Coercion resistance in authentication responsibility shiftingPayas Gupta, Xuhua Ding, Debin Gao. 97-98 [doi]
- PassMap: a map based graphical-password authentication systemHung-Min Sun, Yao-Hsin Chen, Chiung-Cheng Fang, Shih-Ying Chang. 99-100 [doi]