Abstract is missing.
- Public-Key Encryptions Tolerating Adaptive and Composable AdversariesHuafei Zhu. 1-13 [doi]
- Encryption Simulatability ReconsideredYamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia. 14-23 [doi]
- Fully Secure Cipertext-Policy Hiding CP-ABEJunzuo Lai, Robert H. Deng, Yingjiu Li. 24-39 [doi]
- Generic Methods to Achieve Tighter Security Reductions for a Category of IBE SchemesYu Chen, Liqun Chen, Zhong Chen. 40-54 [doi]
- New Fully Secure Hierarchical Identity-Based Encryption with Constant Size CiphertextsSong Luo, Yu Chen, Jian-bin Hu, Zhong Chen. 55-70 [doi]
- Toward Trustworthy Clouds Internet Scale Critical InfrastructureImad M. Abbadi. 71-82 [doi]
- Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based CryptosystemsFangming Zhao, Takashi Nishide, Kouichi Sakurai. 83-97 [doi]
- Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud ComputingJun e Liu, Zhiguo Wan, Ming Gu. 98-107 [doi]
- Privacy Enhanced Access Control by Means of Policy BlindingSaeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova. 108-122 [doi]
- Policy-Based Authentication for Mobile AgentsYikai Wang, Yi Mu, Minjie Zhang. 123-137 [doi]
- Lightweight Delegated Subset Test with Privacy ProtectionXuhua Zhou, Xuhua Ding, Kefei Chen. 138-151 [doi]
- Improving BDD Cryptosystems in General LatticesMichael Rose, Thomas Plantard, Willy Susilo. 152-167 [doi]
- Kipnis-Shamir Attack on Unbalanced Oil-Vinegar SchemeWeiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin. 168-180 [doi]
- A Novel Group Signature Scheme Based on MPKCGuangdong Yang, Shaohua Tang, Li Yang. 181-195 [doi]
- How to Characterize Side-Channel Leakages More Accurately?Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng. 196-207 [doi]
- New Impossible Differential and Known-Key Distinguishers for the 3D CipherJorge Nakahara Jr.. 208-221 [doi]
- Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key BitsYongzhuang Wei, Jiqiang Lu, Yupu Hu. 222-232 [doi]
- BCBC: A More Efficient MAC AlgorithmBo Liang, Wenling Wu, Liting Zhang. 233-246 [doi]
- On the Security of 4-Bit Involutive S-Boxes for Lightweight DesignsBozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng. 247-256 [doi]
- Short Convertible Undeniable Signature in the Standard ModelQiong Huang, Duncan S. Wong. 257-272 [doi]
- A Practical (Non-interactive) Publicly Verifiable Secret Sharing SchemeMahabir Prasad Jhanwar. 273-287 [doi]
- An Efficient Group-Based Secret Sharing SchemeChunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian. 288-301 [doi]
- Traitor Tracing against Public CollaborationXingwen Zhao, Fangguo Zhang. 302-316 [doi]
- Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel ModulesDonghai Tian, Xi Xiong, Changzhen Hu, Peng Liu. 317-332 [doi]
- Sanitizing Microdata without Leak: Combining Preventive and Curative ActionsTristan Allard, Benjamin Nguyen, Philippe Pucheral. 333-342 [doi]
- Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie HostJonghoon Kwon, Jehyun Lee, Heejo Lee. 343-361 [doi]
- A Model for Constraint and Delegation ManagementQuan Pham, Jason Reid, Ed Dawson. 362-371 [doi]
- Non-black-Box Computation of Linear Regression Protocols with Malicious AdversariesHuafei Zhu. 372-385 [doi]
- A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocolsan Wang, Zheng Li, Xianwen Yang, Yanyan Yu. 386-400 [doi]
- A General and Efficient Obfuscation for Programs with Tamper-Proof HardwareNing Ding, Dawu Gu. 401-416 [doi]
- Analysis and Improvement of an Authenticated Key Exchange ProtocolJiaxin Pan, Libin Wang, Changshe Ma. 417-431 [doi]
- Another Elliptic Curve Model for Faster Pairing ComputationLijun Zhang 0013, Kunpeng Wang, Hong Wang, Dingfeng Ye. 432-446 [doi]