Abstract is missing.
- Workflow-Aware Security of Integrated Mobility ServicesPrabhakaran Kasinathan, Jorge Cuéllar. 3-19 [doi]
- Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement LearningKaiming Fang, Guanhua Yan. 20-40 [doi]
- PIAnalyzer: A Precise Approach for PendingIntent Vulnerability AnalysisSascha Groß, Abhishek Tiwari, Christian Hammer 0001. 41-59 [doi]
- Investigating Fingerprinters and Fingerprinting-Alike Behaviour of Android ApplicationsChristof Ferreira Torres, Hugo Jonker. 60-80 [doi]
- Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted DatabaseJianfeng Wang, Xiaofeng Chen 0001, Shifeng Sun, Joseph K. Liu, Man Ho Au, Zhi-hui Zhan. 83-100 [doi]
- Order-Revealing Encryption: File-Injection Attack and Forward SecurityXingChen Wang, Yunlei Zhao. 101-121 [doi]
- SEISMIC: SEcure In-lined Script Monitors for Interrupting CryptojacksWenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, Shuang Hao. 122-142 [doi]
- Detecting and Characterizing Web Bot Traffic in a Large E-commerce MarketplaceHaitao Xu, Zhao Li, Chen Chu, Yuanmi Chen, Yifan Yang, Haifeng Lu, Haining Wang, Angelos Stavrou. 143-163 [doi]
- Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced DatabasesJianghua Liu, Jinhua Ma, Wanlei Zhou, Yang Xiang 0001, Xinyi Huang. 167-186 [doi]
- Efficient and Secure Outsourcing of Differentially Private Data PublicationJin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu. 187-206 [doi]
- Symmetric Searchable Encryption with Sharing and UnsharingSarvar Patel, Giuseppe Persiano, Kevin Yeo. 207-227 [doi]
- Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) SecurityCong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk. 228-246 [doi]
- Breaking Message Integrity of an End-to-End Encryption Scheme of LINETakanori Isobe, Kazuhiko Minematsu. 249-268 [doi]
- Scalable Wildcarded Identity-Based EncryptionJihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh. 269-287 [doi]
- Logarithmic-Size Ring Signatures with Tight Security from the DDH AssumptionBenoît Libert, Thomas Peters, Chen Qian 0002. 288-308 [doi]
- RiffleScrambler - A Memory-Hard Password Storing FunctionKarol Gotfryd, Pawel Lorek, Filip Zagórski. 309-328 [doi]
- Practical Strategy-Resistant Privacy-Preserving ElectionsSébastien Canard, David Pointcheval, Quentin Santos, Jacques Traoré. 331-349 [doi]
- Formal Analysis of Vote Privacy Using Computationally Complete Symbolic AttackerGergei Bana, Rohit Chadha, Ajay Kumar Eeralla. 350-372 [doi]
- Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker StrategiesXueou Wang, Xiaolu Hou, Ruben Rios, Per A. Hallgren, Nils Ole Tippenhauer, Martín Ochoa. 373-392 [doi]
- Constant-Round Client-Aided Secure Comparison ProtocolHiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka. 395-415 [doi]
- Towards Practical RAM Based Secure ComputationNiklas Büscher, Alina Weber, Stefan Katzenbeisser 0001. 416-437 [doi]
- Improved Signature Schemes for Secure Multi-party Computation with Certified InputsMarina Blanton, Myoungin Jeong. 438-460 [doi]
- Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning AttacksAmir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi. 463-484 [doi]
- Trust Anchors in Software Defined NetworksNicolae Paladi, Linus Karlsson, Khalid Elbashir. 485-504 [doi]
- Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted MachinesHui Ma 0002, Rui Zhang 0002, Guomin Yang, Zishuai Song, Shuzhou Sun, Yuting Xiao. 507-526 [doi]
- Making Any Attribute-Based Encryption Accountable, EfficientlyJunzuo Lai, Qiang Tang 0005. 527-547 [doi]
- Decentralized Policy-Hiding ABE with Receiver PrivacyYan Michalevsky, Marc Joye. 548-567 [doi]