Abstract is missing.
- Identity-Embedding Method for Decentralized Public-Key InfrastructureHiroaki Anada, Junpei Kawamoto, Jian Weng, Kouichi Sakurai. 1-14 [doi]
- Diversification of System Calls in Linux BinariesSampsa Rauti, Samuel Laurén, Shohreh Hosseinzadeh, Jari-Matti Mäkelä, Sami Hyrynsalmi, Ville Leppänen. 15-35 [doi]
- Outsourced KP-ABE with Enhanced SecurityChao Li, Bo Lang, Jinmiao Wang. 36-50 [doi]
- A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice VectorsDan Ding, Guizhen Zhu. 51-69 [doi]
- Rerandomizable Threshold Blind SignaturesVeronika Kuchta, Mark Manulis. 70-89 [doi]
- Verifiable Computation of Large PolynomialsJiaqi Hong, Haixia Xu, Peili Li. 90-104 [doi]
- A Characterization of Cybersecurity Posture from Network Telescope DataZhenxin Zhan, Maochao Xu, Shouhuai Xu. 105-126 [doi]
- Key-Exposure Protection in Public Auditing with User Revocation in Cloud StorageHua Guo, Fangchao Ma, Zhoujun Li, Chunhe Xia. 127-136 [doi]
- Software Behavior Model Measuring Approach of Combining Structural Analysis and Language SetJingfeng Xue, Yan Zhang, Changzhen Hu, Hongyu Ren, Zhiqiang Li. 137-150 [doi]
- On Cache Timing Attacks Considering Multi-core Aspects in Virtualized Embedded SystemsMichael Weiß, Benjamin Weggenmann, Moritz August, Georg Sigl. 151-167 [doi]
- How to Choose Interesting Points for Template Attacks More Effectively?Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng. 168-183 [doi]
- NeuronVisor: Defining a Fine-Grained Cloud Root-of-TrustAnbang Ruan, Andrew Martin. 184-200 [doi]
- A Privacy-Aware Access Model on Anonymized DataXuezhen Huang, Jiqiang Liu, Zhen Han. 201-212 [doi]
- Functional Signatures from Indistinguishability ObfuscationLi Wang, Hongda Li, Fei Tang. 213-227 [doi]
- Lightweight Protocol for Trusted Spontaneous CommunicationPrzemyslaw Blaskiewicz, Marek Klonowski, Miroslaw Kutylowski, Piotr Syga. 228-242 [doi]
- Using TPM Secure Storage in Trusted High Availability SystemsMartin Hell, Linus Karlsson, Ben J. M. Smeets, Jelena Mirosavljevic. 243-258 [doi]
- APP Vetting Based on the Consistency of Description and APKWeili Han, Wei Wang, Xinyi Zhang, Weiwei Peng, Zheran Fang. 259-277 [doi]
- Traitor Tracing Based on Partially-Ordered Hierarchical EncryptionYan Zhu, Dandan Li, Liguang Yang. 278-293 [doi]
- SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNsGaoshou Zhai, Tao Guo, Jie Huang. 294-309 [doi]
- Faster Pairing Computation on Jacobi Quartic Curves with High-Degree TwistsFan Zhang, Liangze Li, Hongfeng Wu. 310-327 [doi]
- DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data LifetimesMin Zhu, Bibo Tu, Ruibang You, Yanzhao Li, Dan Meng. 328-345 [doi]
- Template Attacks Based on Priori KnowledgeGuangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng. 346-363 [doi]
- Some Observations on the Lightweight Block Cipher Piccolo-80Wenying Zhang, Jiaqi Zhang, Xiangqian Zheng. 364-373 [doi]
- A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner BasesYun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang. 374-393 [doi]
- Efficient Public Key Encryption with Field-Free Conjunctive Keywords SearchChenggen Song, Xin Liu, Yalong Yan. 394-406 [doi]
- mOT+: An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA GroupBaoping Tian, Fushan Wei, Chuangui Ma. 407-421 [doi]
- Secure (M+1) st-Price Auction with Automatic Tie-BreakTakashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta. 422-437 [doi]