Abstract is missing.
- Privacy-Preserving Speaker AuthenticationManas A. Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso. 1-22 [doi]
- Differential Attacks on Reduced RIPEMD-160Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer. 23-38 [doi]
- Revisiting Difficulty Notions for Client Puzzles and DoS ResilienceBogdan Groza, Bogdan Warinschi. 39-54 [doi]
- On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher DegreeNoboru Kunihiro. 55-69 [doi]
- Strong Authentication with Mobile PhoneSanna Suoranta, André Andrade, Tuomas Aura. 70-85 [doi]
- Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot. 86-103 [doi]
- Domain-Specific Pseudonymous Signatures for the German Identity CardJens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler. 104-119 [doi]
- Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained PlatformsFalko Strenzke. 120-135 [doi]
- 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging BlocksSamiran Bag, Aritra Dhar, Pinaki Sarkar. 136-150 [doi]
- Learning Fine-Grained Structured Input for Memory Corruption DetectionLei Zhao, Debin Gao, Lina Wang. 151-167 [doi]
- Dynamic Anomaly Detection for More Trustworthy Outsourced ComputationSami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini, Stefan Katzenbeisser. 168-187 [doi]
- An Empirical Study of Dangerous Behaviors in Firefox ExtensionsJiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, Zhiyong Feng. 188-203 [doi]
- Collaboration-Preserving Authenticated Encryption for Operational Transformation SystemsMichael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari. 204-223 [doi]
- Selective Document Retrieval from Encrypted DatabaseChristoph Bösch, Qiang Tang, Pieter H. Hartel, Willem Jonker. 224-241 [doi]
- Additively Homomorphic Encryption with a Double Decryption Mechanism, RevisitedAndreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser. 242-257 [doi]
- Secure Hierarchical Identity-Based Identification without Random OraclesAtsushi Fujioka, Taiichi Saito, Keita Xagawa. 258-273 [doi]
- Efficient Two-Move Blind Signatures in the Common Reference String ModelEssam Ghadafi, Nigel P. Smart. 274-289 [doi]
- Compliance Checking for Usage-Constrained Credentials in Trust Negotiation SystemsJinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang. 290-305 [doi]
- A Quantitative Approach for Inexact Enforcement of Security PoliciesPeter Drábik, Fabio Martinelli, Charles Morisset. 306-321 [doi]
- OSDM: An Organizational Supervised Delegation Model for RBACNezar Nassr, Nidal Aboudagga, Eric Steegmans. 322-337 [doi]
- GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic LibraryJohannes Gilger, Johannes Barnickel, Ulrike Meyer. 338-353 [doi]
- A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature MatchingCiprian-Petrisor Pungila, Viorel Negru. 354-369 [doi]
- Intended Actions: Risk Is Conflicting IncentivesLisa Rajbhandari, Einar Snekkenes. 370-386 [doi]
- On the Self-similarity Nature of the Revocation DataCarlos Gañán, Jorge Mata-Díaz, Jose L. Muñoz, Oscar Esparza, Juanjo Alins. 387-400 [doi]