Abstract is missing.
- Forward Secure Ring Signature without Random OraclesJoseph K. Liu, Tsz Hon Yuen, Jianying Zhou. 1-14 [doi]
- Ring Signature Schemes from Lattice Basis DelegationJin Wang, Bo Sun. 15-28 [doi]
- Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key CyclesXinfeng Lei, Rui Xue, Ting Yu. 29-41 [doi]
- A Variant of Boyen-Waters Anonymous IBE SchemeSong Luo, Qingni Shen, Yongming Jin, Yu Chen, Zhong Chen, Sihan Qing. 42-56 [doi]
- Non-interactive Opening for Ciphertexts Encrypted by Shared KeysJiageng Chen, Keita Emura, Atsuko Miyaji. 57-68 [doi]
- Lightweight RFID Mutual Authentication Protocol against Feasible ProblemsYongming Jin, Huiping Sun, Wei Xin, Song Luo, Zhong Chen. 69-77 [doi]
- A Note on a Privacy-Preserving Distance-Bounding ProtocolJean-Philippe Aumasson, Aikaterini Mitrokotsa, Pedro Peris-Lopez. 78-92 [doi]
- Delegable Provable Data Possession for Remote Data in the CloudsShiuan-Tzuo Shen, Wen-Guey Tzeng. 93-111 [doi]
- Unconditionally Secure Oblivious Transfer Based on Channel DelaysKai-Yuen Cheong, Atsuko Miyaji. 112-120 [doi]
- Preserving Security and Privacy in Large-Scale VANETsBo Qin, Qianhong Wu, Josep Domingo-Ferrer, Lei Zhang 0009. 121-135 [doi]
- A Probabilistic Secret Sharing Scheme for a Compartmented Access StructureYuyin Yu, Mingsheng Wang. 136-142 [doi]
- Ideal Secret Sharing Schemes with Share SelectabilityKeita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi. 143-157 [doi]
- A Novel Pyramidal Dual-Tree Directional Filter Bank Domain Color Image Watermarking AlgorithmPanpan Niu, Xiangyang Wang, Mingyu Lu. 158-172 [doi]
- Detection for Multiplicative Watermarking in DCT Domain by Cauchy ModelXiang Yin, Shuoling Peng, Xinshan Zhu. 173-183 [doi]
- Extension of Barreto-Voloch Root Extraction MethodZhengjun Cao, Xiao Fan. 184-189 [doi]
- Two Applications of an Incomplete Additive Character Sum to Estimating Nonlinearity of Boolean FunctionsYusong Du, Fangguo Zhang. 190-201 [doi]
- Evaluating Optimized Implementations of Stream Cipher ZUC Algorithm on FPGALei Wang, Jiwu Jing, Zongbin Liu, Lingchen Zhang, Wuqiong Pan. 202-215 [doi]
- First Differential Attack on Full 32-Round GOSTNicolas Courtois, Michal Misztal. 216-227 [doi]
- Collision Attack for the Hash Function Extended MD4Gaoli Wang. 228-241 [doi]
- Linear Cryptanalysis of ARIA Block CipherZhiqiang Liu, Dawu Gu, Ya Liu 0001, Juanru Li, Wei Li 0013. 242-254 [doi]
- Latin Dances Revisited: New Analytic Results of Salsa20 and ChaChaTsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake. 255-266 [doi]
- Behavior Analysis-Based Dynamic Trust Measurement ModelDan Wang, Xiaodong Zhou, Wenbing Zhao. 267-281 [doi]
- Improvement and Analysis of VDP Method in Time/Memory Tradeoff ApplicationsWenhao Wang, Dongdai Lin, Zhenqi Li, TianZe Wang. 282-296 [doi]
- Analyzing the Performance of Dither Modulation in Presence of Composite AttacksXinshan Zhu. 297-305 [doi]
- Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor NetworksWen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao. 306-318 [doi]
- A Unified Security Framework for Multi-domain Wireless Mesh NetworksZe Wang, Maode Ma, Wenju Liu, Xixi Wei. 319-329 [doi]
- Ontology Model-Based Static Analysis of Security VulnerabilitiesLian Yu, Shizhong Wu, Tao Guo, Guowei Dong, Cheng-Cheng Wan, Yin-Hang Jing. 330-344 [doi]
- A Multi-compositional Enforcement on Information Flow SecurityCong Sun, Ennan Zhai, Zhong Chen, Jianfeng Ma. 345-359 [doi]
- HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented ProgrammingJun Jiang, Xiaoqi Jia, Dengguo Feng, Shengzhi Zhang, Peng Liu 0005. 360-373 [doi]
- An Efficient Finger-Knuckle-Print Based Recognition System Fusing SIFT and SURF Matching ScoresG. S. Badrinath, Aditya Nigam, Phalguni Gupta. 374-387 [doi]
- Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic CharacterizationZhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu. 388-398 [doi]
- Situational Assessment of Intrusion Alerts: A Multi Attack Scenario EvaluationHadi Shiravi, Ali Shiravi, Ali A. Ghorbani. 399-413 [doi]
- Minimising Anonymity Loss in Anonymity Networks under DoS AttacksMu Yang, Vladimiro Sassone. 414-429 [doi]