Abstract is missing.
- Minimizing Databases Attack Surface Against SQL Injection AttacksDimitris Geneiatakis. 1-9 [doi]
- Ensuring Kernel Integrity Using KIPBMFHZhifeng Chen, QingBao Li, Songhui Guo, Ye Wang. 10-17 [doi]
- Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-Bit MicrocontrollersZhenzhen Bao, Peng Luo, Dongdai Lin. 18-36 [doi]
- On Promise Problem of the Generalized Shortest Vector ProblemWenwen Wang, Kewei Lv. 37-49 [doi]
- Secret Key Extraction with Quantization Randomness Using Hadamard Matrix on QuaDRiGa ChannelXuanxuan Wang, Lihuan Jiang, Lars Thiele, Yongming Wang. 50-61 [doi]
- Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature AlgorithmWeiqiong Cao, Jingyi Feng, Shaofeng Zhu, Hua Chen, Wenling Wu, Xucang Han, Xiaoguang Zheng. 62-70 [doi]
- The Security of Polynomial Information of Diffie-Hellman KeyYao Wang, Kewei Lv. 71-81 [doi]
- How to Vote Privately Using BitcoinZhichao Zhao, T.-H. Hubert Chan. 82-96 [doi]
- Multidimensional Zero-Correlation Linear Cryptanalysis on 23-Round LBlock-sHong Xu, Ping Jia, Geshi Huang, Xuejia Lai. 97-108 [doi]
- Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox TraceableZhen Liu, Duncan S. Wong. 109-124 [doi]
- Generic Construction of Audit Logging Schemes with Forward Privacy and AuthenticityShoichi Hirose. 125-140 [doi]
- A Novel Post-processing Method to Improve the Ability of Reconstruction for Video Leaking SignalXuejie Ding, Meng Zhang, Jun Shi, Wei-qing Huang. 141-151 [doi]
- TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control SystemsBo Yang, Yu Qin, Yingjun Zhang, Weijin Wang, Dengguo Feng. 152-168 [doi]
- Characterization of the Third Descent Points for the k-error Linear Complexity of 2^n 2 n -periodic Binary SequencesJianqin Zhou, Wanquan Liu, Xifeng Wang. 169-183 [doi]
- QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA ImplementationsChenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu. 184-198 [doi]
- Strategy of Relations Collection in Factoring RSA ModulusHaibo Yu, Guoqiang Bai. 199-211 [doi]
- Ultra High-Performance ASIC Implementation of SM2 with SPA ResistanceDan Zhang, Guoqiang Bai. 212-219 [doi]
- Multi-input Functional Encryption and Its Application in Outsourcing ComputationPeili Li, Haixia Xu, Yuanyuan Ji. 220-235 [doi]
- A Multivariate Encryption Scheme with RainbowTakanori Yasuda, Kouichi Sakurai. 236-251 [doi]
- Efficient and Secure Many-to-One Signature DelegationRajeev Anand Sahu, Vishal Saraswat. 252-259 [doi]
- Fully Secure IBE with Tighter Reduction in Prime Order Bilinear GroupsJie Zhang, Aijun Ge, Siyu Xiao, Chuangui Ma. 260-268 [doi]
- A Secure Route Optimization Mechanism for Expressive Internet Architecture (XIA) MobilityHongwei Meng, Zhong Chen, Ziqian Meng, Chuck Song. 269-281 [doi]
- An Entropy Based Encrypted Traffic ClassifierMohammad Saiful Islam Mamun, Ali A. Ghorbani, Natalia Stakhanova. 282-294 [doi]
- Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS ApproachQian Zhang, Ying Jiang, Liping Ding. 295-302 [doi]
- An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS AttacksDegang Sun, Kun Yang, Weiqing Huang, Yan Wang, Bo Hu. 303-310 [doi]
- Dynamic Hybrid Honeypot System Based Transparent Traffic Redirection MechanismWenjun Fan, Zhihui Du, David Fernández Cambronero, Xinning Hui. 311-319 [doi]
- Leveraging Static Probe Instrumentation for VM-based Anomaly Detection SystemAdy Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi. 320-334 [doi]
- MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud StorageZizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li. 335-345 [doi]
- Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field CommunicationYafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia. 346-355 [doi]
- A Solution of Code Authentication on AndroidXue Zhang, Rui Zhang. 356-362 [doi]
- Verifiable Proxy Re-encryption from Indistinguishability ObfuscationMuhua Liu, Ying Wu, Jinyong Chang, Rui Xue, Wei Guo. 363-378 [doi]
- Higher-Order Masking Schemes for SimonJiehui Tang, Yongbin Zhou, Hailong Zhang, Shuang Qiu. 379-392 [doi]
- An ORAM Scheme with Improved Worst-Case Computational OverheadNairen Cao, Xiaoqi Yu, Yufang Yang, Linru Zhang, Siu-Ming Yiu. 393-405 [doi]
- A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage SystemChuiyi Xie, Ying Huo, Sihan Qing, Shoushan Luo, Lingli Hu. 406-413 [doi]
- Suffix Type String Matching Algorithms Based on Multi-windows and Integer ComparisonHongbo Fan, Shupeng Shi, Jing Zhang, Li Dong. 414-420 [doi]
- Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor NetworksDepeng Chen, Daojing He, Sammy Chan. 421-435 [doi]
- Preserving Context Privacy in Distributed Hash Table Wireless Sensor NetworksPaolo Palmieri. 436-444 [doi]
- Prior Classification of Stego Containers as a New Approach for Enhancing Steganalyzers AccuracyViktor Monarev, Andrey Pestunov. 445-457 [doi]
- Eavesdropper: A Framework for Detecting the Location of the Processed Result in HadoopChuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu, Xiang Wan. 458-466 [doi]
- Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSNShangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang. 467-477 [doi]
- A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal InfluencesRong Wang, Min Zhang, Dengguo Feng, Yanyan Fu, Zhenyu Chen. 478-484 [doi]