Abstract is missing.
- Audio Steganalysis Based on Lossless Data-Compression TechniquesFatiha Djebbar, Beghdad Ayad. 1-9 [doi]
- Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography SchemeYang-Wai Chow, Willy Susilo, Duncan S. Wong. 10-21 [doi]
- Impact of the Revocation Service in PKI PricesCarlos Gañán, Jose L. Muñoz, Oscar Esparza, Jorge Mata-Díaz, Juanjo Alins. 22-32 [doi]
- Cryptanalysis of Multi-Prime RSA with Small Prime DifferenceHatem M. Bahig, Ashraf Bhery, Dieaa I. Nassr. 33-44 [doi]
- Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key CryptosystemJun Xu, Lei Hu, Siwei Sun. 45-57 [doi]
- Improved Related-Key Differential Attacks on Reduced-Round LBlockShusheng Liu, Zheng Gong, Libin Wang. 58-69 [doi]
- Countermeasures on Application Level Low-Rate Denial-of-Service AttackYajuan Tang. 70-80 [doi]
- Firewall Packet Filtering Optimization Using Statistical Traffic Awareness TestZouheir Trabelsi, Liren Zhang, Safaa Zeidan. 81-92 [doi]
- Group Behavior Metrics for P2P Botnet DetectionJohn Felix Charles Joseph, Ali A. Ghorbani. 93-104 [doi]
- Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGAYuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu. 105-118 [doi]
- Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State ModelHao Xiong, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu-Ming Yiu, Sihan Qing. 119-130 [doi]
- Conversion of Real-Numbered Privacy-Preserving Problems into the Integer DomainWilko Henecka, Nigel Bean, Matthew Roughan. 131-141 [doi]
- Perfect Ambiguous Optimistic Fair ExchangeYang Wang, Man Ho Au, Willy Susilo. 142-153 [doi]
- Privacy-Preserving Noisy Keyword Search in Cloud ComputingXiaoqiong Pang, Bo Yang 0003, Qiong Huang. 154-166 [doi]
- Forward Secure Attribute-Based SignaturesTsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou. 167-177 [doi]
- On Constant-Round Precise Zero-KnowledgeNing Ding, Dawu Gu. 178-190 [doi]
- Outsourcing Encryption of Attribute-Based Encryption with MapReduceJingwei Li, Chunfu Jia, Jin Li, Xiaofeng Chen 0001. 191-201 [doi]
- Security Enhancement of Identity-Based Identification with ReversibilityAtsushi Fujioka, Taiichi Saito, Keita Xagawa. 202-213 [doi]
- Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services ArchitectureRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 214-227 [doi]
- Permission-Based Abnormal Application Detection for AndroidJiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen. 228-239 [doi]
- Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted DataVrizlynn L. L. Thing, Darell J. J. Tan. 240-251 [doi]
- Detecting Encryption Functions via Process Emulation and IL-Based Program AnalysisRuoxu Zhao, Dawu Gu, Juanru Li, Hui Liu. 252-263 [doi]
- Taint Analysis of Security Code in the KLEE Symbolic Execution EngineRicardo Corin, Felipe Andrés Manzano. 264-275 [doi]
- A Generic Approach for Providing Revocation Support in Secret HandshakeYanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou. 276-284 [doi]
- An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag PrivacyAnjia Yang, Yunhui Zhuang, Duncan S. Wong. 285-292 [doi]
- Exploring Mobile Proxies for Better Password AuthenticationNitesh Saxena, Jonathan Voris. 293-302 [doi]
- On Security of Universal Hash Function Based Multiple AuthenticationAysajan Abidin. 303-310 [doi]
- A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's AttackZhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, Dongdai Lin. 311-320 [doi]
- Applying Time-Memory-Data Trade-Off to Plaintext Recovery AttackZhenqi Li, Bin Zhang, Yao Lu, Jing Zou, Dongdai Lin. 321-330 [doi]
- Comparison between Side-Channel Analysis DistinguishersHoussem Maghrebi, Olivier Rioul, Sylvain Guilley, Jean-Luc Danger. 331-340 [doi]
- Acceleration of Composite Order Bilinear Pairing on Graphics HardwareYe Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu-Ming Yiu. 341-348 [doi]
- Evaluating the Effect of Tolerance on Click-Draw Based Graphical Password SchemeYuxin Meng, Wenjuan Li. 349-356 [doi]
- Robust Evidence Detection of Copy-Rotate-Move Forgery in Image Based on Singular Value DecompositionLiu Yong, Huang Meishan, Lin Bogang. 357-364 [doi]
- Cookie-Proxy: A Scheme to Prevent SSLStrip AttackSendong Zhao, Ding Wang, Sicheng Zhao, Wu Yang, Chunguang Ma. 365-372 [doi]
- Detecting and Preventing ActiveX API-Misuse Vulnerabilities in Internet ExplorerTing Dai, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang. 373-380 [doi]
- Endpoint Mitigation of DDoS Attacks Based on Dynamic ThresholdingDaewon Kim, Byoung-Koo Kim, Ikkyun Kim, Jeongnyeo Kim, Hyunsook Cho. 381-391 [doi]
- Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit DistanceYan Cao, Qiang Wei, QingXian Wang. 392-399 [doi]
- A Privacy-Preserving Path-Checking Solution for RFID-Based Supply ChainsWei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen. 400-407 [doi]
- Efficient Attribute Proofs in Anonymous Credential Using Attribute-based CryptographyYan Zhang, Dengguo Feng. 408-415 [doi]
- F5P5: Keyword Search over Encrypted Data with Five Functions and Five Privacy AssurancesHuimin Shuai, Wen Tao Zhu. 416-426 [doi]
- Location Privacy Policy Management SystemArej Muhammed, Dan Lin, Anna Cinzia Squicciarini. 427-434 [doi]
- Privacy Protection in Social Networks Using l-DiversityLiangwen Yu, Jiawei Zhu, Zhengang Wu, Tao Yang, Jian-bin Hu, Zhong Chen. 435-444 [doi]
- Selling Power Back to the Grid in a Secure and Privacy-Preserving MannerTat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li, Tin Wing Mui, Yu Hin Tsang, Chun Kin Kwok, Kwun Yin Yu. 445-452 [doi]
- A Key Sharing Fuzzy Vault SchemeLin You, Mengsheng Fan, Jie Lu, Shengguo Wang, Fenghai Li. 453-460 [doi]
- A New Version of McEliece PKC Based on Convolutional CodesCarl Löndahl, Thomas Johansson. 461-470 [doi]
- Flexible Attribute-Based EncryptionSeiko Arita. 471-478 [doi]
- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random OraclesYanli Ren, Shuozhong Wang, Xinpeng Zhang. 479-487 [doi]
- A Comparative Study of Malware Family ClassificationRafiqul Islam, Irfan Altas. 488-496 [doi]
- A Fine-Grained Classification Approach for the Packed Malicious CodeShanqing Guo, Shuangshuang Li, Yan Yu, Anlei Hu, Tao Ban. 497-504 [doi]