Abstract is missing.
- Fully Secure Self-Updatable Encryption in Prime Order Bilinear GroupsPratish Datta, Ratna Dutta, Sourav Mukhopadhyay. 1-18 [doi]
- Related-Key Security for Hybrid EncryptionXianhui Lu, Bao Li, Dingding Jia. 19-32 [doi]
- ARBRA: Anonymous Reputation-Based Revocation with Efficient AuthenticationLi Xi, Jianxiong Shao, Kang Yang, Dengguo Feng. 33-53 [doi]
- Attribute-Based Signatures for Circuits from Multilinear MapsFei Tang, Hongda Li, Bei Liang. 54-71 [doi]
- PAEQ: Parallelizable Permutation-Based Authenticated EncryptionAlex Biryukov, Dmitry Khovratovich. 72-89 [doi]
- (Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160Gaoli Wang, Yanzhao Shen. 90-103 [doi]
- Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic AttacksLin Jiao, Bin Zhang, Mingsheng Wang. 104-119 [doi]
- Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of KnowledgeNing Ding. 120-139 [doi]
- Lightweight Zero-Knowledge Proofs for Crypto-Computing ProtocolsSven Laur, Bingsheng Zhang. 140-157 [doi]
- Efficient Secure and Verifiable Outsourcing of Matrix MultiplicationsYihua Zhang, Marina Blanton. 158-178 [doi]
- Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty ComputationsToomas Krips, Jan Willemson. 179-197 [doi]
- Exploiting the Floating-Point Computing Power of GPUs for RSAFangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao. 198-215 [doi]
- On Formally Bounding Information Leakage by Statistical EstimationMichele Boreale, Michela Paolini. 216-236 [doi]
- Structure Based Data De-Anonymization of Social Networks and Mobility TracesShouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah. 237-254 [doi]
- Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live ForensicsYingxin Cheng, Xiao Fu, Bin Luo, Rui Yang, Hao Ruan. 255-272 [doi]
- SystemWall: An Isolated Firewall Using Hardware-Based Memory IntrospectionSebastian Biedermann, Jakub Szefer. 273-290 [doi]
- Soundsquatting: Uncovering the Use of Homophones in Domain SquattingNick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen. 291-308 [doi]
- Reducing User Tracking through Automatic Web Site State IsolationsMartin Stopczynski, Michael Zugelder. 309-327 [doi]
- Comprehensive Behavior Profiling for Proactive Android Malware DetectionBritton Wolfe, Karim O. Elish, Danfeng (Daphne) Yao. 328-344 [doi]
- Analyzing Android Browser Apps for file: // VulnerabilitiesDaoyuan Wu, Rocky K. C. Chang. 345-363 [doi]
- Expressive and Secure Searchable Encryption in the Public Key SettingZhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng. 364-376 [doi]
- Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" DistributivelyAggelos Kiayias, Murat Osmanoglu, Qiang Tang. 377-387 [doi]
- Adding Controllable Linkability to Pairing-Based Group Signatures for FreeDaniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer. 388-400 [doi]
- "To Share or not to Share" in Client-Side Encrypted CloudsDuane C. Wilson, Giuseppe Ateniese. 401-412 [doi]
- eavesROP: Listening for ROP Payloads in Data StreamsChristopher Jämthagen, Linus Karlsson, Paul Stankovski, Martin Hell. 413-424 [doi]
- Defining Injection AttacksDonald Ray, Jay Ligatti. 425-441 [doi]
- Efficient Attack Forest Construction for Automotive On-board NetworksMartin Salfer, Hendrik Schweppe, Claudia Eckert. 442-453 [doi]
- Winnowing Double Structure for Wildcard Query in Payload AttributionYichen Wei, Fei Xu, Xiaojun Chen, Yiguo Pu, Jinqiao Shi, Sihan Qing. 454-464 [doi]
- An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS EnvironmentsWeizhi Meng, Wenjuan Li, Lam-for Kwok. 465-476 [doi]
- transAD: An Anomaly Detection Network Intrusion Sensor for the WebSharath Hiremagalore, Daniel Barbará, Dan Fleck, Walter Powell, Angelos Stavrou. 477-489 [doi]
- Using Machine Language Model for Mimimorphic Malware DetectionPinghai Yuan, Qingkai Zeng, Yao Liu. 490-501 [doi]
- CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory DumpRyan Farley, Xinyuan Wang. 502-514 [doi]
- SIACHEN: A Fine-Grained Policy Language for the Mitigation of Cross-Site Scripting AttacksAshar Javed, Jens Riemer, Jörg Schwenk. 515-528 [doi]
- Security Issues in OAuth 2.0 SSO ImplementationsWanpeng Li, Chris J. Mitchell. 529-541 [doi]
- A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile DevicesJavier González, Michael Hölzl, Peter Riedl, Philippe Bonnet, René Mayrhofer. 542-554 [doi]
- MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile DevicesXingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing. 555-567 [doi]