Abstract is missing.
- Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine IntrospectionIrfan Ahmed, Golden G. Richard III, Aleksandar Zoranic, Vassil Roussev. 3-19 [doi]
- Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel TasksSteffen Wagner, Christoph Krauß, Claudia Eckert. 20-36 [doi]
- The Security Defect of a Multi-pixel Encoding MethodTeng Guo, Feng Liu, Chuan-Kun Wu, YoungChang Hou, YaWei Ren, Wen Wang. 39-48 [doi]
- Encrypted Secret Sharing and Analysis by Plaintext RandomizationStephen R. Tate, Roopa Vishwanathan, Scott Weeks. 49-65 [doi]
- Round-Efficient Private Stable Matching from Additive Homomorphic EncryptionTadanori Teruya, Jun Sakuma. 69-86 [doi]
- Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based EncryptionTakashi Kitagawa, Hiroki Kojima, Nuttapong Attrapadung, Hideki Imai. 87-99 [doi]
- Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext LengthTakashi Yamakawa, Shota Yamada 0001, Takahiro Matsuda 0002, Goichiro Hanaoka, Noboru Kunihiro. 100-109 [doi]
- 4GMOP: Mopping Malware Initiated SMS Traffic in Mobile NetworksMarián Kühnel, Ulrike Meyer. 113-129 [doi]
- Design and Analysis of a Sophisticated Malware Attack Against Smart GridByungho Min, Vijay Varadharajan. 130-139 [doi]
- Multi-round Attacks on Structural Controllability Properties for Non-complete Random GraphsCristina Alcaraz, Estefanía Etchevés Miciolino, Stephen D. Wolthusen. 140-151 [doi]
- Improved Meet-in-the-Middle Attacks on Round-Reduced ARIADongxia Bai, Hongbo Yu. 155-168 [doi]
- Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks RevisitedLin Jiao, Bin Zhang, Mingsheng Wang. 169-184 [doi]
- N with Random BitsRouto Terada, Reynaldo Cáceres Villena. 185-196 [doi]
- Faster 128-EEA3 and 128-EIA3 SoftwareRoberto Avanzi, Billy Bob Brumley. 199-208 [doi]
- Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite BasesAlberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores. 209-217 [doi]
- Offline Dictionary Attack on Password Authentication Schemes Using Smart CardsDing Wang, Ping Wang. 221-237 [doi]
- Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained DevicesYanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng, Jianying Zhou. 238-247 [doi]
- Practical and Provably Secure Distance-BoundingIoana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay. 248-258 [doi]
- On the Viability of CAPTCHAs for use in Telephony Systems: A Usability Field StudyNiharika Sachdeva, Nitesh Saxena, Ponnurangam Kumaraguru. 261-279 [doi]
- Cars, Condoms, and FacebookVaibhav Garg, L. Jean Camp. 280-289 [doi]
- Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud DataYanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan, Jianying Zhou. 293-308 [doi]
- Fine-Grained Access Control for HTML5-Based Mobile Applications in AndroidXing Jin, Lusha Wang, Tongbo Luo, Wenliang Du. 309-318 [doi]
- CrowdFlow: Efficient Information Flow SecurityChristoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz. 321-337 [doi]
- DroidTest: Testing Android Applications for Leakage of Private InformationSarker T. Ahmed Rumee, Donggang Liu. 341-353 [doi]
- A Dangerous Mix: Large-Scale Analysis of Mixed-Content WebsitesPing Chen, Nick Nikiforakis, Christophe Huygens, Lieven Desmet. 354-363 [doi]
- An Ordered Multisignature Scheme Under the CDH Assumption Without Random OraclesNaoto Yanai, Masahiro Mambo, Eiji Okamoto. 367-377 [doi]
- Human Assisted Randomness Generation Using Video GamesMohsen Alimomeni, Reihaneh Safavi-Naini. 378-390 [doi]
- Uber Assumption FrameworkAntoine Joux, Antoine Rojat. 391-406 [doi]
- A Secure and Efficient Method for Scalar Multiplication on Supersingular Elliptic Curves over Binary FieldsMatheus F. de Oliveira, Marco Aurélio Amaral Henriques. 407-416 [doi]