Abstract is missing.
- Access Control in and Around the BrowserDieter Gollmann. 1-7 [doi]
- Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical ToolsMichel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache. 8-14 [doi]
- Preserving Receiver-Location Privacy in Wireless Sensor NetworksJavier Lopez, Ruben Rios, Jorge Cuéllar. 15-27 [doi]
- Data Security and Privacy in the CloudPierangela Samarati. 28-41 [doi]
- Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic ProtocolsMiroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Lukasz Krzywiecki. 42-59 [doi]
- A CAPTCHA Scheme Based on the Identification of Character LocationsVu Duc Nguyen, Yang-Wai Chow, Willy Susilo. 60-74 [doi]
- A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection ApproachesYuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo 0002. 75-89 [doi]
- Obfuscating Encrypted Web Traffic with Combined ObjectsYi Tang, Piaoping Lin, Zhaokai Luo. 90-104 [doi]
- A Website Credibility Assessment Scheme Based on Page AssociationPei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei. 105-118 [doi]
- A Methodology for Hook-Based Kernel Level RootkitsChien-Ming Chen, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun. 119-128 [doi]
- Precise Instruction-Level Side Channel Profiling of Embedded ProcessorsMehari Msgna, Konstantinos Markantonakis, Keith Mayes. 129-143 [doi]
- Automated Proof for Authorization Protocols of TPM 2.0 in Computational ModelWeijin Wang, Yu Qin, Dengguo Feng. 144-158 [doi]
- SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector MachineYonggan Hou, J. W. Zhuge, Dan Xin, Wenya Feng. 159-171 [doi]
- HDROP: Detecting ROP Attacks Using Performance Monitoring CountersHongwei Zhou, Xin Wu, Wenchang Shi, Jinhui Yuan, Bin Liang. 172-186 [doi]
- Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAsShaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng. 187-201 [doi]
- High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing UnitShujie Cui, Johann Großschädl, Zhe Liu 0001, Qiuliang Xu. 202-216 [doi]
- A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto AlgorithmChenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu. 217-231 [doi]
- Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power AnalysisDanhui Wang, an Wang, Xuexin Zheng. 232-246 [doi]
- Implementing a Covert Timing Channel Based on Mimic FunctionJing Wang, Le Guan, Limin Liu, Daren Zha. 247-261 [doi]
- Detecting Frame Deletion in H.264 VideoHongmei Liu, Songtao Li, Shan Bian. 262-270 [doi]
- Efficient Adaptive Oblivious Transfer in UC FrameworkVandana Guleria, Ratna Dutta. 271-286 [doi]
- Multi-receiver Authentication Scheme for Multiple Messages Based on Linear CodesJun Zhang, Xinran Li, Fang-Wei Fu. 287-301 [doi]
- Efficient Sealed-Bid Auction Protocols Using Verifiable Secret SharingMehrdad Nojoumian, Douglas R. Stinson. 302-317 [doi]
- Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear GroupsJie Zhang, Futai Zhang. 318-329 [doi]
- Proofs of Retrievability Based on MRD CodesShuai Han, Shengli Liu, Kefei Chen, Dawu Gu. 330-345 [doi]
- TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcingTao Jiang, Xiaofeng Chen 0001, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu. 346-358 [doi]
- Improvement of a Remote Data Possession Checking Protocol from Algebraic SignaturesYong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia. 359-372 [doi]
- Distributed Pseudo-Random Number Generation and Its Application to Cloud DatabaseJiageng Chen, Atsuko Miyaji, Chunhua Su. 373-387 [doi]
- A Provably Secure Ring Signature Scheme with Bounded Leakage ResilienceHuaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer. 388-402 [doi]
- Two-Party (Blind) Ring Signatures and Their ApplicationsMan Ho Au, Willy Susilo. 403-417 [doi]
- Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group ModelFei Tang, Hongda Li, Qihua Niu, Bei Liang. 418-432 [doi]
- Attribute-Based Signature with Message RecoveryKefeng Wang, Yi Mu, Willy Susilo, Fuchun Guo. 433-447 [doi]
- An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data SharingKaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu. 448-461 [doi]
- Multi-recipient Encryption in Heterogeneous SettingPuwen Wei, Yuliang Zheng, Wei Wang. 462-480 [doi]
- ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key LeakageMingwu Zhang. 481-495 [doi]
- Provably Secure Certificateless Authenticated Asymmetric Group Key AgreementLei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jianwei Liu, Wenchang Shi. 496-510 [doi]
- New Variants of Lattice Problems and Their NP-HardnessWulu Li. 511-523 [doi]
- Improved Preimage Attacks against Reduced HAS-160Ronglin Hao, Bao Li, Bingke Ma, Xiaoqian Li. 524-536 [doi]
- Modular Inversion Hidden Number Problem RevisitedJun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng. 537-551 [doi]
- On the Recursive Construction of MDS Matrices for Lightweight CryptographyHong Xu, Lin Tan, Xuejia Lai. 552-563 [doi]
- On Constructions of Circulant MDS Matrices for Lightweight CryptographyKishan Chand Gupta, Indranil Ghosh Ray. 564-576 [doi]