Abstract is missing.
- Security and Privacy in the IoTElisa Bertino. 3-10 [doi]
- On Crossroads of Privacy ProtectionMiroslaw Kutylowski. 11-20 [doi]
- The Dual Role of Smartphones in IoT SecurityKui Ren. 21-24 [doi]
- Implementing Indistinguishability Obfuscation Using GGH15Zheng Zhang, Fangguo Zhang, Huang Zhang. 27-43 [doi]
- From Attack on Feige-Shamir to Construction of Oblivious TransferJingyue Yu, Yi Deng, Yu Chen 0003. 44-64 [doi]
- A New Lattice Sieving Algorithm Base on Angular Locality-Sensitive HashingPing Wang, DongDong Shang. 65-80 [doi]
- A Simpler Bitcoin Voting ProtocolHaibo Tian, Liqing Fu, Jiejie He. 81-98 [doi]
- Post-Quantum Secure Remote Password Protocol from RLWE ProblemXinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li. 99-116 [doi]
- Hashing into Twisted Jacobi Intersection CurvesXiaoyang He, Wei Yu 0008, Kunpeng Wang. 117-138 [doi]
- Identity-Based Key-Insulated Aggregate Signatures, RevisitedNobuaki Kitajima, Naoto Yanai, Takashi Nishide. 141-156 [doi]
- A New Constant-Size Accountable Ring Signature Scheme Without Random OraclesSudhakar Kumawat, Souradyuti Paul. 157-179 [doi]
- A Universal Designated Multi-Verifier Transitive Signature SchemeFei Zhu, Yuexin Zhang, Chao Lin, Wei Wu, Ru Meng. 180-195 [doi]
- Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature SchemeXiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, Dengguo Feng. 196-208 [doi]
- Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big DataXuguang Wu, Yiliang Han, Minqing Zhang, Shuaishuai Zhu. 211-222 [doi]
- Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes)Geng Wang, Xiao Zhang, Yanmei Li. 223-241 [doi]
- Fully Homomorphic Encryption Scheme Based on Public Key Compression and Batch ProcessingLiquan Chen, Ming Lim, Muyang Wang. 242-259 [doi]
- Leveled FHE with Matrix Message SpaceBiao Wang, Xueqing Wang, Rui Xue. 260-277 [doi]
- Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable CiphertextHanwen Feng, Jianwei Liu, Qianhong Wu, Weiran Liu. 278-298 [doi]
- NativeSpeaker: Identifying Crypto Misuses in Android Native Code LibrariesQing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, Dawu Gu. 301-320 [doi]
- A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSsCong Chen, Dongdai Lin, Wei Zhang, Xiaojun Zhou. 321-341 [doi]
- Cryptanalysis of Acorn in Nonce-Reuse SettingXiaojuan Zhang, Dongdai Lin. 342-361 [doi]
- An Improved Method to Unveil Malware's Hidden BehaviorQiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, Zeming Yang. 362-382 [doi]
- BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network TracesBiao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, Jianguo Jiang. 383-403 [doi]
- Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP ModellingJun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, Fushan Wei. 404-426 [doi]
- Meet in the Middle Attack on Type-1 Feistel ConstructionYuanhao Deng, Chenhui Jin, Rongjia Li. 427-444 [doi]
- Influence of Error on Hamming Weights for ASCAChujiao Ma, John A. Chandy, Laurent Michel, Fanghui Liu, Waldemar Cruz. 447-460 [doi]
- State-of-the-Art: Security Competition in Talent EducationXiu Zhang, Baoxu Liu, Xiaorui Gong, Zhenyu Song. 461-481 [doi]
- A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae StructuresXiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, Siyun Yan. 482-499 [doi]
- NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud EnvironmentChonghua Wang, Zhiyu Hao, Xiaochun Yun. 500-517 [doi]
- A Method to Enlarge the Design Distance of BCH Codes and Some Classes of Infinite Optimal Cyclic CodesShanding Xu, Xiwang Cao, Chunming Tang. 518-528 [doi]