Abstract is missing.
- An Efficient Privacy-Preserving E-coupon SystemWeiwei Liu, Yi Mu, Guomin Yang. 3-15 [doi]
- Spatial Bloom Filters: Enabling Privacy in Location-Aware ApplicationsPaolo Palmieri 0001, Luca Calderoni, Dario Maio. 16-36 [doi]
- Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation FlawTao Zhang, Sherman S. M. Chow. 37-48 [doi]
- Revocation in Publicly Verifiable Outsourced ComputationJames Alderman, Christian Janson, Carlos Cid, Jason Crampton. 51-71 [doi]
- Private Aggregation with Custom Collusion ToleranceConstantinos Patsakis, Michael Clear, Paul Laird. 72-89 [doi]
- Ring Signatures of Constant Size Without Random OraclesFei Tang, Hongda Li. 93-108 [doi]
- Universally Composable Identity Based Adaptive Oblivious Transfer with Access ControlVandana Guleria, Ratna Dutta. 109-129 [doi]
- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of KnowledgeNing Ding. 130-149 [doi]
- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBACDenisse Muñante Arzapalo, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté. 150-169 [doi]
- Optimal Proximity ProofsIoana Boureanu, Serge Vaudenay. 170-190 [doi]
- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor FunctionsBei Liang, Rui Zhang, Hongda Li. 193-206 [doi]
- Attacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationZhangjie Huang, Lei Hu, Jun Xu. 207-219 [doi]
- Fully Homomorphic Encryption with Auxiliary InputsFuqun Wang, Kunpeng Wang. 220-238 [doi]
- Trapdoors for Ideal Lattices with ApplicationsRussell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow. 239-256 [doi]
- Speeding Up the Search Algorithm for the Best Differential and Best Linear TrailsZhenzhen Bao, Wentao Zhang, Dongdai Lin. 259-285 [doi]
- The Boomerang Attacks on BLAKE and BLAKE2Yonglin Hao. 286-310 [doi]
- Second Preimage Analysis of WhirlwindRiham AlTawy, Amr M. Youssef. 311-328 [doi]
- Boomerang Attack on Step-Reduced SHA-512Hongbo Yu, Dongxia Bai. 329-342 [doi]
- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis TechniqueMegha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya. 343-360 [doi]
- Rig: A Simple, Secure and Flexible Design for Password HashingDonghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya. 361-381 [doi]
- Efficient Hardware Accelerator for AEGIS-128 Authenticated EncryptionDebjyoti Bhattacharjee, Anupam Chattopadhyay. 385-402 [doi]
- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size CiphertextsZhen Liu, Zhenfu Cao, Duncan S. Wong. 403-423 [doi]
- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area NetworksChangji Wang, Xi-Lei Xu, Yuan Li, Dong-Yuan Shi. 424-442 [doi]
- Parallelized Software Implementation of Elliptic Curve Scalar MultiplicationJean-Marc Robert. 445-462 [doi]
- A Note on Diem's ProofSong Tian, Kunpeng Wang, Bao Li, Wei Yu. 463-471 [doi]
- Stand-by Attacks on E-ID Password AuthenticationLucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski. 475-495 [doi]
- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone AppsGuillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez. 496-515 [doi]
- A Lightweight Security Isolation Approach for Virtual Machines DeploymentHongliang Liang, Changyao Han, Daijie Zhang, Dongyang Wu. 516-529 [doi]
- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS SensorsNeel Bedekar, Chiranjit Shee. 530-546 [doi]