Abstract is missing.
- Analyzing Android Repackaged Malware by Decoupling Their Event BehaviorsZimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu. 3-20 [doi]
- Hybrid Risk Assessment Model Based on Bayesian NetworksFrançois-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Hervé Debar. 21-40 [doi]
- Hooking Graceful Moments: A Security Analysis of Sudo Session HandlingJi-Hoon Jeong, Hyung Chan Kim, Il Hwan Park, Bong-Nam Noh. 41-60 [doi]
- Security of Web of Things: A SurveyWei Xie, Yong Tang, Shuhui Chen, Yi Zhang, Yuanming Gao. 61-70 [doi]
- UC-Secure Dynamic Searchable Symmetric Encryption SchemeKaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, Kazuki Yoneyama. 73-90 [doi]
- Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted IndexesTakato Hirano, Mitsuhiro Hattori, Yutaka Kawai, Nori Matsuda, Mitsugu Iwamoto, Kazuo Ohta, Yusuke Sakai, Tatsuji Munaka. 91-110 [doi]
- Secure Automata-Based Substring Search Scheme on Encrypted DataHiroaki Yamamoto. 111-131 [doi]
- Related-Key Impossible Differential Analysis of Full KhudraQianqian Yang, Lei Hu, Siwei Sun, Ling Song. 135-146 [doi]
- On the Division Property of Simon48 and Simon64Zejun Xiang, Wentao Zhang, Dongdai Lin. 147-163 [doi]
- Practical Analysis of Key Recovery Attack Against Search-LWE ProblemMomonari Kudo, Junpei Yamaguchi, Yang Guo, Masaya Yasuda. 164-181 [doi]
- A Note on Fault Attacks Against Deterministic Signature SchemesAlessandro Barenghi, Gerardo Pelosi. 182-192 [doi]
- Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption SchemesAkinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka. 195-211 [doi]
- Privacy-Preserving Wi-Fi Fingerprinting Indoor LocalizationTao Zhang, Sherman S. M. Chow, Zhe Zhou, Ming Li. 215-233 [doi]
- Formal Policy-Based Provenance AuditDenis Butin, Denise Demirel, Johannes A. Buchmann. 234-253 [doi]
- Recipient Privacy in Online Social NetworksFilipe Beato, Kimmo Halunen, Bart Mennink. 254-264 [doi]
- Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its VariantsRisa Yashiro, Takanori Machida, Mitsugu Iwamoto, Kazuo Sakiyama. 267-285 [doi]
- On the Security and Key Generation of the ZHFE Encryption SchemeWenbin Zhang, Chik-How Tan. 289-304 [doi]
- Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL ReductionJintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao. 305-315 [doi]
- Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel ComputationHiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama. 319-334 [doi]