Abstract is missing.
- ECDSA on Things: IoT Integrity Protection in PractiseJohannes Bauer 0003, Ralf C. Staudemeyer, Henrich C. Pöhls, Alexandros G. Fragkiadakis. 3-17 [doi]
- Identity in the Internet-of-Things (IoT): New Challenges and OpportunitiesKwok-Yan Lam, Chi-Hung Chi. 18-26 [doi]
- A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded SystemsYaowen Zheng, Kai Cheng, Zhi Li 0018, Shiran Pan, Hongsong Zhu, Limin Sun. 27-36 [doi]
- A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning AttacksDuohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li. 39-53 [doi]
- Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization SystemWei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun. 54-70 [doi]
- Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public CloudsLei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin. 71-84 [doi]
- The Security of Individual Bit for XTRKewei Lv, Si-Wei Ren, Wenjie Qin. 87-98 [doi]
- On the Robustness of Learning Parity with NoiseNan Yao, Yu Yu, Xiangxue Li, Dawu Gu. 99-106 [doi]
- The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming WeightWenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu. 107-123 [doi]
- The Variant of Remote Set Problem on LatticesWenwen Wang, Kewei Lv, Jianing Liu. 124-133 [doi]
- Compression-Based Integral Prior Classification for Improving SteganalysisViktor Monarev, Ilja Duplischev, Andrey Pestunov. 134-144 [doi]
- Group Verification Based Multiple-Differential Collision AttackChanghai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai. 145-156 [doi]
- A Transparent Learning Approach for Attack Prediction Based on User Behavior AnalysisPeizhi Shao, Jiuming Lu, Raymond K. Wong, Wenzhuo Yang. 159-172 [doi]
- Application of Stylometry to DarkWeb Forum User IdentificationThanh Nghia Ho, Wee Keong Ng. 173-183 [doi]
- SECapacity: A Secure Capacity Scheduler in YARNChuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu. 184-194 [doi]
- Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoTChristoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin. 197-213 [doi]
- MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the CloudYang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu. 214-226 [doi]
- Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVRBo Song, Yiming Zhao. 227-238 [doi]
- Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFISMartin Draschl, Jutta Hämmerle-Uhl, Andreas Uhl. 241-253 [doi]
- Medical Record System Using Blockchain, Big Data and TokenizationPaul Tak Shing Liu. 254-261 [doi]
- Is it Good or Bad? Disclosure of Medical Ailments on TwitterB. S. Vidyalakshmi, Raymond K. Wong. 262-277 [doi]
- Weaknesses in Security Considerations Related to Chaos-Based Image EncryptionThomas Hütter, Mario Preishuber, Jutta Hämmerle-Uhl, Andreas Uhl. 278-291 [doi]
- Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime FieldsYuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin. 292-306 [doi]
- Differential Fault Analysis on MidoriWei Cheng, Yongbin Zhou, Laurent Sauvage. 307-317 [doi]
- Private Boolean Query Processing on Encrypted DataHoang Giang Do, Wee Keong Ng. 321-332 [doi]
- Privacy Leakage via Attribute Inference in Directed Social NetworksRaymond K. Wong, B. S. Vidyalakshmi. 333-346 [doi]
- DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential PrivacyShen Yan, Shiran Pan, Wen Tao Zhu, Keke Chen. 347-357 [doi]
- A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS CloudsWeijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang, Peng Liu. 361-375 [doi]
- The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM ArchitectureRobert Buhren, Julian Vetter, Jan C. Nordholz. 376-391 [doi]
- Towards Trustworthy Smart Cyber-Physical SystemsM. W. David, C. R. Yerkes, M. E. Simmons, W. Franceschini. 392-399 [doi]
- Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3Da-Zhi Sun, Xiao-Hong Li. 403-417 [doi]
- Optimizing Secure Computation Programs with Private ConditionalsPeeter Laud, Alisa Pankova. 418-430 [doi]
- Automated Security Proof of Cryptographic Support Commands in TPM 2.0Weijin Wang, Yu Qin, Bo Yang, Yingjun Zhang, Dengguo Feng. 431-441 [doi]
- How to Meet Big Data When Private Set Intersection Realizes Constant Communication ComplexitySumit Kumar Debnath, Ratna Dutta. 445-454 [doi]
- Novel MITM Attacks on Security Protocols in SDN: A Feasibility StudyXin Wang, Neng Gao, Lingchen Zhang, Zongbin Liu, Lei Wang. 455-465 [doi]
- A Practical Scheme for Data Secure Transport in VoIP ConferencingDali Zhu, Renjun Zhang, Xiaozhuo Gu, Haitao Zhu. 466-475 [doi]