Abstract is missing.
- Error-Tolerant Algebraic Side-Channel Attacks Using BEELing Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao. 1-15 [doi]
- SEDB: Building Secure Database Services for Sensitive DataQuanwei Cai, Jingqiang Lin, FengJun Li, Qiongxiao Wang. 16-30 [doi]
- Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile DevicesQianying Zhang, Shijun Zhao, Li Xi, Wei Feng, Dengguo Feng. 31-48 [doi]
- Protecting Elliptic Curve Cryptography Against Memory Disclosure AttacksYang Yang, Zhi Guan, Zhe Liu 0001, Zhong Chen. 49-60 [doi]
- 4P_VES: A Collusion-Resistant Accountable Virtual Economy SystemHong Zhang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen. 61-73 [doi]
- Privacy-Preserving Distance-Bounding Proof-of-KnowledgeAhmad Ahmadi, Reihaneh Safavi-Naini. 74-88 [doi]
- Distance Lower BoundingXifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi. 89-104 [doi]
- Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC FrameworkVandana Guleria, Ratna Dutta. 105-119 [doi]
- TagDroid: Hybrid SSL Certificate Verification in AndroidHui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li, Dawu Gu. 120-131 [doi]
- A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear FilterXiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu. 132-142 [doi]
- A Private Lookup Protocol with Low Online Complexity for Secure Multiparty ComputationPeeter Laud. 143-157 [doi]
- Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR ProcessorsZhe Liu 0001, Hwajeong Seo, Johann Großschädl, Howon Kim. 158-175 [doi]
- New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge SecurityNuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada 0001. 176-190 [doi]
- Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic RadiationDe-gang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang. 191-199 [doi]
- How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice?Yingxian Zheng, Yongbin Zhou, Zhenmei Yu, Chengyu Hu, Hailong Zhang. 200-214 [doi]
- Attribute Based Key-Insulated Signatures with Message RecoveryY. Sreenivasa Rao, Ratna Dutta. 215-229 [doi]
- XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear AlgebraSabyasachi Dutta, Avishek Adhikari. 230-242 [doi]
- A Visual One-Time Password Authentication Scheme Using Mobile DevicesYang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi. 243-257 [doi]
- Secure and Efficient Scheme for Delegation of Signing RightsRajeev Anand Sahu, Vishal Saraswat. 258-273 [doi]
- Fully Secure Ciphertext-Policy Attribute Based Encryption with Security MediatorYuechen Chen, Zoe L. Jiang, Siu-Ming Yiu, Joseph K. Liu, Man Ho Au, Xuan Wang. 274-289 [doi]
- MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features AnalysisAsadullah Al Galib, Reihaneh Safavi-Naini. 290-304 [doi]
- Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security ModelYanfei Guo, Zhenfeng Zhang, Jiang Zhang, Xuexian Hu. 305-320 [doi]