Abstract is missing.
- Engineering Trustworthy SystemsSanjay Burman. 1 [doi]
- Secure Implementations for the Internet of ThingsJörn-Marc Schmidt. 2 [doi]
- Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHPKunal Sadalkar, Radhesh Mohandas, Alwyn R. Pais. 3-15 [doi]
- Security of Prime Field Pairing Cryptoprocessor against Differential Power AttackSantosh Ghosh, Dipanwita Roy Chowdhury. 16-29 [doi]
- Embedded Software Security through Key-Based Control Flow ObfuscationRajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia. 30-44 [doi]
- Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet TransformSambaran Bandyopadhyay, Ruchira Naskar, Rajat Subhra Chakraborty. 45-56 [doi]
- Access Policy Based Key Management in Multi-level Multi-distributor DRM ArchitectureRatna Dutta, Dheerendra Mishra, Sourav Mukhopadhyay. 57-71 [doi]
- Access Polynomial Based Self-healing Key Distribution with Improved Security and PerformanceRatna Dutta. 72-82 [doi]
- An ID-Based Proxy Multi Signature Scheme without Bilinear PairingsNamita Tiwari, Sahadeo Padhye. 83-92 [doi]
- Distributed Signcryption Schemes with Formal Proof of SecurityIndivar Gupta, P. K. Saxena. 93-110 [doi]
- Identity Based Online/Offline Encryption and Signcryption Schemes RevisitedS. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan. 111-127 [doi]
- "Rank Correction": A New Side-Channel Approach for Secret Key RecoveryMaxime Nassar, Youssef Souissi, Sylvain Guilley, Jean-Luc Danger. 128-143 [doi]
- A Cache Trace Attack on CAMELLIARishabh Poddar, Amit Datta, Chester Rebeiro. 144-156 [doi]
- An Improvement of Linearization-Based Algebraic AttacksSatrajit Ghosh, Abhijit Das. 157-167 [doi]
- Generalized Avalanche Test for Stream Cipher AnalysisP. R. Mishra, Indivar Gupta, N. Rajesh Pillai. 168-180 [doi]
- On Applications of Singular Matrices over Finite Fields in CryptographyDhirendra Singh Yadav, Rajendra Kumar Sharma, Wagish Shukla. 181-185 [doi]