Abstract is missing.
- Cryptanalysis of Midori128 Using Impossible Differential TechniquesZhan Chen, Huaifeng Chen, Xiaoyun Wang. 1-12 [doi]
- The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear ComplexityWenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu. 13-36 [doi]
- Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013Jingguo Bi, Jiayang Liu. 37-47 [doi]
- A Spark-Based DDoS Attack Detection Model in Cloud ServicesJian Zhang, Yawei Zhang, Pin Liu, Jianbiao He. 48-64 [doi]
- Security of SM4 Against (Related-Key) Differential CryptanalysisJian Zhang, Wenling Wu, Yafei Zheng. 65-78 [doi]
- KopperCoin - A Distributed File Storage with Financial IncentivesHenning Kopp, Christoph Bösch, Frank Kargl. 79-93 [doi]
- Practical Signature Scheme from \varGamma Γ -ProtocolZhoujun Ma, Li Yang, Yunlei Zhao. 94-109 [doi]
- A Host-Based Detection Method of Remote Access Trojan in the Early StageDaichi Adachi, Kazumasa Omote. 110-121 [doi]
- Collision Attacks on CAESAR Second-Round Candidate: ELmDJian Zhang, Wenling Wu, Yafei Zheng. 122-136 [doi]
- Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse MonitoringHong Wei Siew, Saw Chin Tan, Ching Kwang Lee. 137-150 [doi]
- Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPUZhiniang Peng, Shaohua Tang, Ju Chen, Chen Wu, Xinglin Zhang. 151-166 [doi]
- Homomorphically Encrypted Arithmetic Operations Over the Integer RingChen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng. 167-181 [doi]
- A Privacy Preserving Source Verifiable Encryption SchemeZhongyuan Yao, Yi Mu, Guomin Yang. 182-193 [doi]
- Structural Evaluation for Simon-Like Designs Against Integral AttackHuiling Zhang, Wenling Wu. 194-208 [doi]
- RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity LimitsPrzemyslaw Blaskiewicz, Lukasz Krzywiecki, Piotr Syga. 209-223 [doi]
- Privacy-Preserving Cloud Auditing with Multiple UploadersGe Wu, Yi Mu, Willy Susilo, Fuchun Guo. 224-237 [doi]
- A Formal Concept of Domain Pseudonymous SignaturesKamil Kluczniak, Lucjan Hanzlik, Miroslaw Kutylowski. 238-254 [doi]
- Efficient Tag Path Authentication Protocol with Less Tag MemoryHongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao. 255-270 [doi]
- Anonymizing Bitcoin TransactionDimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shifeng Sun, Xinyi Huang. 271-283 [doi]
- Physical-Layer Identification of HF RFID Cards Based on RF FingerprintingGuozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji. 284-299 [doi]
- Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-TreeYaoan Jin, Chunhua Su, Na Ruan, Weijia Jia. 300-314 [doi]
- Countering Burst Header Packet Flooding Attack in Optical Burst Switching NetworkAdel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi, Jorge Arturo Cobb. 315-329 [doi]
- Authenticated CAN Communications Using Standardized Cryptographic TechniquesZhuo Wei, Yanjiang Yang, Tieyan Li. 330-343 [doi]
- Thrifty Zero-Knowledge - When Linear Programming Meets CryptographySimon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache. 344-353 [doi]
- ARMv8 Shellcodes from 'A' to 'Z'Hadrien Barral, Houda Ferradi, Rémi Géraud, Georges-Axel Jaloyan, David Naccache. 354-377 [doi]