Abstract is missing.
- Macros Finder: Do You Remember LOVELETTER?Hiroya Miura, Mamoru Mimura, Hidema Tanaka. 3-18 [doi]
- Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier DetectionMax Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Peter Filzmoser. 19-36 [doi]
- Universal Wavelet Relative Distortion: A New Counter-Forensic Attack on Photo Response Non-Uniformity Based Source Camera IdentificationVenkata Udaya Sameer, Ruchira Naskar. 37-49 [doi]
- Compact Ring Signature in the Standard Model for BlockchainHao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen. 50-65 [doi]
- A Generic Construction of Integrated Secure-Channel Free PEKS and PKETatsuya Suzuki 0002, Keita Emura, Toshihiro Ohigashi. 69-86 [doi]
- An Almost Non-interactive Order Preserving Encryption SchemeJingjing Guo, Jianfeng Wang, Zhiwei Zhang, Xiaofeng Chen 0001. 87-100 [doi]
- Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingFucai Luo, Kunpeng Wang, Changlu Lin. 101-115 [doi]
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled CircuitsHuige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu. 119-140 [doi]
- Constrained (Verifiable) Pseudorandom Function from Functional EncryptionPratish Datta. 141-159 [doi]
- Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric EncryptionTakato Hirano, Yutaka Kawai, Yoshihiro Koseki. 160-175 [doi]
- Certificateless Public Key Signature Schemes from Standard AlgorithmsZhaohui Cheng, Liqun Chen. 179-197 [doi]
- A New Design of Online/Offline Signatures Based on LatticeMingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang. 198-212 [doi]
- CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear CaseLucas Schabhüser, Denis Butin, Johannes Buchmann 0001. 213-228 [doi]
- Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local RevocationMaharage Nisansala Sevwandi Perera, Takeshi Koshiba. 229-247 [doi]
- Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based SignaturesBagus Santoso, Taiyo Yamaguchi, Tomoyuki Ohkubo. 248-262 [doi]
- Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption SchemesSergiu Carpov, Oana Stan. 265-281 [doi]
- Keyword-Based Delegable Proofs of StorageBinanda Sengupta, Sushmita Ruj. 282-298 [doi]
- A Generic Framework for Accountable Optimistic Fair Exchange ProtocolJia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan. 299-309 [doi]
- Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message VerificationWenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, Jin Li. 313-328 [doi]
- A Two-Stage Classifier Approach for Network Intrusion DetectionWei Zong, Yang-Wai Chow, Willy Susilo. 329-340 [doi]
- DSH: Deniable Secret Handshake FrameworkYangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu. 341-353 [doi]
- Non-adaptive Group-Testing Aggregate MAC SchemeShoichi Hirose, Junji Shikata. 357-372 [doi]
- TMGMap: Designing Touch Movement-Based Geographical Password Authentication on SmartphonesWeizhi Meng, Zhe Liu. 373-390 [doi]
- Seeing Is Believing: Authenticating Users with What They See and RememberWayne Chiu, Kuo-Hui Yeh, Akihito Nakamura. 391-403 [doi]
- T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace AttacksBo-Yeon Sim, Kyu Young Choi, Dukjae Moon, Hyo-Jin Yoon, Jihoon Cho, Dong-Guk Han. 407-423 [doi]
- Recovering Memory Access Sequence with Differential Flush+Reload AttackZhiwei Yuan, Yang Li 0001, Kazuo Sakiyama, Takeshi Sugawara, Jian Wang. 424-439 [doi]
- Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWEYuntao Wang, Thomas Wunderer. 440-452 [doi]
- Efficient and Secure Firmware Update/Rollback Method for Vehicular DevicesYuichi Komano, Zhengfan Xia, Takeshi Kawabata, Hideo Shimizu. 455-467 [doi]
- Regulating IoT MessagesAlban Gabillon, Emmanuel Bruno. 468-480 [doi]
- A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor NetworksJing Xu, Yuqiang Zhang, Fei Xu, Lei Zhou, Shuanglin Jiang. 481-492 [doi]
- Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile HealthcareEntao Luo, Guojun Wang, Kun Tang, Quanyou Zhao, Chen He, Liyong Guo. 495-505 [doi]
- Privacy-Preserving Data Collection for Mobile Phone Sensing TasksYi-Ning Liu, Yan-Ping Wang, Xiao-fen Wang, Zhe Xia, Jingfang Xu. 506-518 [doi]
- M-ORAM Revisited: Security and Construction UpdatesKarin Sumongkayothin. 521-532 [doi]
- Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVMSabyasachi Dutta, Nishant Nikam, Sushmita Ruj. 533-543 [doi]
- (k, l)-Clustering for Transactional Data Streams AnonymizationJimmy Tekli, Bechara al Bouna, Youssef Bou Issa, Marc Kamradt, Ramzi A. Haraty. 544-556 [doi]
- A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusionWei Yin 0004, Qiaoyan Wen, Wenmin Li, Hua Zhang 0001, Zhengping Jin. 559-577 [doi]
- Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and RobustnessPartha Sarathi Roy 0001, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai. 578-594 [doi]
- An Efficient and Provably Secure Private Polynomial Evaluation SchemeZhe Xia, Bo Yang, Mingwu Zhang, Yi Mu 0001. 595-609 [doi]
- Efficient Traceable Oblivious Transfer and Its ApplicationsWeiwei Liu 0005, Yinghui Zhang, Yi Mu 0001, Guomin Yang, Yangguang Tian. 610-621 [doi]