Abstract is missing.
- Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion DetectionYuxin Meng, Lam-for Kwok. 1-15 [doi]
- Trusted Identity Management for Overlay NetworksStefan Kraxberger, Ronald Toegl, Martin Pirker, Elisa Pintado Guijarro, Guillermo Garcia Millan. 16-30 [doi]
- Situational Awareness for Improving Network Resilience ManagementMixia Liu, Tao Feng, Paul Smith, David Hutchison. 31-43 [doi]
- Optimal Defense Strategies for DDoS Defender Using Bayesian Game ModelYuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang. 44-59 [doi]
- Attribute Specified Identity-Based EncryptionHao Xiong, Tsz Hon Yuen, Cong Zhang, Yi Jun He, Siu-Ming Yiu. 60-74 [doi]
- Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and ConstructionsMingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu. 75-90 [doi]
- Identity-Based Multisignature with Message RecoveryKefeng Wang, Yi Mu, Willy Susilo. 91-104 [doi]
- Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE SchemeDingding Jia, Bao Li, Yamin Liu, Qixiang Mei. 105-116 [doi]
- Accountable Trapdoor Sanitizable SignaturesJunzuo Lai, Xuhua Ding, Yongdong Wu. 117-131 [doi]
- A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-ReleaseKaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang. 132-146 [doi]
- About Hash into Montgomery Form Elliptic CurvesWei Yu, Kunpeng Wang, Bao Li, Song Tian. 147-159 [doi]
- Joint Triple-Base Number System for Multi-Scalar MultiplicationWei Yu, Kunpeng Wang, Bao Li, Song Tian. 160-173 [doi]
- Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement ParksDivyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg. 174-188 [doi]
- Secure RFID Ownership Transfer ProtocolsNan Li, Yi Mu, Willy Susilo, Vijay Varadharajan. 189-203 [doi]
- Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input ModelGuomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong. 204-217 [doi]
- Simplified PACE|AA ProtocolLucjan Hanzlik, Lukasz Krzywiecki, Miroslaw Kutylowski. 218-232 [doi]
- Expressing User Access Authorization Exceptions in Conventional Role-Based Access ControlXiaofan Liu, Natasha Alechina, Brian Logan. 233-247 [doi]
- Efficient Attack Detection Based on a Compressed ModelShichao Jin, Okhee Kim, Tieming Chen. 248-262 [doi]
- A Digital Forensic Framework for Automated User Activity ReconstructionJungin Kang, Sangwook Lee, Heejo Lee. 263-277 [doi]
- Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid MiddlewareJairo Serrano, Eduardo César, Elisa Heymann, Barton P. Miller. 278-294 [doi]
- VulLocator: Automatically Locating Vulnerable Code in Binary ProgramsYingjun Zhang, Kai Chen, Yifeng Lian. 295-308 [doi]
- Software Protection with Obfuscation and EncryptionVivek Balachandran, Sabu Emmanuel. 309-320 [doi]
- Secure Content Delivery in DRM System with Consumer PrivacyDheerendra Mishra, Sourav Mukhopadhyay. 321-335 [doi]
- Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel DistinguishersHui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang. 336-352 [doi]
- Cryptanalysis of the OKH Authenticated Encryption SchemePeng Wang, Wenling Wu, Liting Zhang. 353-360 [doi]
- Security Evaluation of Rakaposhi Stream CipherMohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld. 361-371 [doi]
- Improved Algebraic and Differential Fault Attacks on the KATAN Block CipherLing Song, Lei Hu. 372-386 [doi]