Abstract is missing.
- Blockchain-Based Secure Data Provenance for Cloud StorageYuan Zhang 0006, Xiaodong Lin, Chunxiang Xu. 3-19 [doi]
- uMine: A Blockchain Based on Human MinersHenning Kopp, Frank Kargl, Christoph Bösch, Andreas Peter. 20-38 [doi]
- LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent DomainsXi Luo, Liming Wang, Zhen Xu, Wei An. 41-56 [doi]
- Study on Advanced Botnet Based on Publicly Available ResourcesJie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui. 57-74 [doi]
- Deep Packet Inspection with Delayed Signature Matching in Network AuditingYingpei Zeng, Shanqing Guo. 75-91 [doi]
- Low-Rate DoS Attack Detection Based on Two-Step Cluster AnalysisDan Tang, Rui Dai, Liu Tang, Sijia Zhan, Jianping Man. 92-104 [doi]
- On the Weakness of Constant Blinding PRNG in Flash PlayerChenyu Wang, Tao Huang, Hongjun Wu. 107-123 [doi]
- Random Number Generators Can Be Fooled to Behave BadlyGeorge Teseleanu. 124-141 [doi]
- Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic ComputationZiyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong. 142-157 [doi]
- Accelerating Integer Based Fully Homomorphic Encryption Using Frequency Domain MultiplicationShakirah Hashim, Mohammed Benaissa. 161-176 [doi]
- Comparison-Based Attacks Against Noise-Free Fully Homomorphic Encryption SchemesAlessandro Barenghi, Nicholas Mainardi, Gerardo Pelosi. 177-191 [doi]
- On Security in Encrypted ComputingPeter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001. 192-211 [doi]
- PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient OutsourcingMeng Zheng, Jun Zhou, Zhenfu Cao, Xiaolei Dong. 215-231 [doi]
- Linking Differential Identifiability with Differential PrivacyAnis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens. 232-247 [doi]
- PP-MCSA: Privacy Preserving Multi-channel Double Spectrum AuctionZhili Chen, Sheng Chen, Hong Zhong 0001, Lin Chen 0002, Miaomiao Tian. 248-267 [doi]
- Hierarchical Group Signatures with Verifier-Local RevocationLin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin. 271-286 [doi]
- Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local RevocationMaharage Nisansala Sevwandi Perera, Takeshi Koshiba. 287-302 [doi]
- Towards Practical Lattice-Based One-Time Linkable Ring SignaturesCarsten Baum, Huang Lin, Sabine Oechsner. 303-322 [doi]
- Slop: Towards an Efficient and Universal Streaming Log ParserZhiyuan Zhao, Chenxu Wang, Wei Rao. 325-341 [doi]
- Community Discovery of Attribution Trace Based on Deep Learning ApproachJian Xu, Xiaochun Yun, Yongzheng Zhang 0002, Zhenyu Cheng. 342-357 [doi]
- Examine Manipulated Datasets with Topology Data Analysis: A Case StudyYun Guo, Daniel Sun, Guoqiang Li 0001, Shiping Chen. 358-373 [doi]
- Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional EncryptionYunong Liang, Zhenfu Cao, Xiaolei Dong, Jiachen Shen. 377-392 [doi]
- Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern LeakageCédric Van Rompay, Refik Molva, Melek Önen. 393-408 [doi]
- Identity-Based Functional Encryption for Quadratic Functions from LatticesKelly Yun, Xin Wang, Rui Xue. 409-425 [doi]
- Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based EncryptionRui Zhang 0002, Yang Tao. 426-441 [doi]
- Publicly Verifiable Data Transfer and Deletion Scheme for Cloud StorageChangsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen 0001. 445-458 [doi]
- Publicly Verifiable Static Proofs of Storage: A Novel Scheme and Efficiency ComparisonsHenning Kopp, Frank Kargl, Christoph Bösch. 459-477 [doi]
- Verifiable Single-Server Private Information RetrievalXingfeng Wang, Liang Zhao. 478-493 [doi]
- Cryptographic Password ObfuscationGiovanni Di Crescenzo, Lisa Bahler, Brian A. Coan. 497-512 [doi]
- CCA Secure Multi-recipient KEM from LPNHaitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan. 513-529 [doi]
- Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global IdentitiesHiroaki Anada, Seiko Arita. 530-547 [doi]
- Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation TreeKai Chen, Ning Zhang, Liming Wang, Zhen Xu. 551-565 [doi]
- PCA: Page Correlation Aggregation for Memory Deduplication in Virtualized EnvironmentsMin Zhu, Kun Zhang, Bibo Tu. 566-583 [doi]
- Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction DataXiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu. 584-597 [doi]
- Certifying Variant of RSA with Generalized ModuliYao Lu 0002, Noboru Kunihiro, Rui Zhang 0002, Liqiang Peng, Hui Ma 0002. 598-608 [doi]
- Attack Trees in IsabelleFlorian Kammüller. 611-628 [doi]
- Automated Verification of Noninterference PropertyFan Zhang, Cong Zhang, Mingdi Xu, Xiaoli Liu, Fangning Hu, Han-Chieh Chao. 629-646 [doi]
- Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three SubsetsYa Han, Yongqiang Li, Mingsheng Wang. 647-663 [doi]
- Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the ApplicationsMingjiang Huang, Liming Wang, Yan Zhang. 664-681 [doi]
- MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS QueryChengwei Peng, Xiaochun Yun, Yongzheng Zhang 0002, Shuhao Li. 685-695 [doi]
- Detecting Intrusion in the Traffic Signals of an Intelligent Traffic SystemAbdullahi Chowdhury, Gour C. Karmakar, Joarder Kamruzzaman, Tapash Saha. 696-707 [doi]
- A Linguistic Approach Towards Intrusion Detection in Actual Proxy LogsMamoru Mimura, Hidema Tanaka. 708-718 [doi]
- Simau: A Dynamic Privilege Management Mechanism for Host in Cloud DatacentersLin Wang, Min Zhu, Qing Li, Bibo Tu. 721-731 [doi]
- USB Packets Filtering Policies and an Associated Low-Cost Simulation FrameworkXiaoshu Ji, Gurvan Le Guernic, Nora Cuppens-Boulahia, Frédéric Cuppens. 732-742 [doi]
- FPGA-Based Assessment of Midori and Gift Lightweight Block CiphersCarlos Andres Lara-Nino, Arturo Diaz-Perez, Miguel Morales-Sandoval. 745-755 [doi]
- Simpler CCA Secure PKE from LPN Problem Without Double-TrapdoorHaitao Cheng, Xiangxue Li, Haifeng Qian, Di Yan. 756-766 [doi]
- PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGXHuorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng. 767-777 [doi]
- Application of Public Ledgers to Revocation in Distributed Access ControlThanh Bui, Tuomas Aura. 781-792 [doi]
- Micropaying to a Distributed Payee with Instant ConfirmationPeifang Ni, Hongda Li, Dongxue Pan. 793-804 [doi]
- Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server EnvironmentPing Wang, Zijian Zhang, Ding Wang 0002. 805-816 [doi]