Abstract is missing.
- Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion DetectionYuxin Meng, Lam-for Kwok. 1-14 [doi]
- On the Automated Analysis of Safety in Usage Control: A New Decidability ResultSilvio Ranise, Alessandro Armando. 15-28 [doi]
- Attestation of Mobile Baseband StacksSteffen Wagner, Sascha Wessel, Frederic Stumpf. 29-43 [doi]
- A Scalable Link Model for Local Optical Wireless NetworksTae-Gyu Lee, Gi-Soo Chung. 44-57 [doi]
- Addressing Situational Awareness in Critical Domains of a Smart GridCristina Alcaraz, Javier Lopez. 58-71 [doi]
- Identifying OS Kernel Objects for Run-Time Security AnalysisAmani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy. 72-85 [doi]
- Background Transfer Method for Ubiquitous ComputingTae-Gyu Lee, Gi-Soo Chung. 86-99 [doi]
- Selective Opening Chosen Ciphertext Security Directly from the DDH AssumptionShengli Liu, Fangguo Zhang, Kefei Chen. 100-112 [doi]
- Proxy Signature Scheme Based on Isomorphisms of PolynomialsShaohua Tang, Lingling Xu. 113-125 [doi]
- Universal Designated Verifier SigncryptionFei Tang, Changlu Lin, Pinhui Ke. 126-134 [doi]
- A Bird's Eye View on the I2P Anonymous File-Sharing EnvironmentJuan Pablo Timpanaro, Isabelle Chrisment, Olivier Festor. 135-148 [doi]
- A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory DataSamaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, Hassan Mahdikhani. 149-165 [doi]
- Estimating the Number of Hosts Corresponding to an Address while Preserving AnonymityAlif Wahid, Christopher Leckie, Chenfeng Vincent Zhou. 166-179 [doi]
- Efficient and Robust Identity-Based Handoff Authentication in Wireless NetworksQi Han, Yinghui Zhang, Xiaofeng Chen 0001, Hui Li, Jiaxiang Quan. 180-191 [doi]
- An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile NetworksYifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding. 192-205 [doi]
- The Performance of Public Key-Based Authentication ProtocolsKaiqi Xiong. 206-219 [doi]
- Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-NetLong-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu. 220-232 [doi]
- Resilience Strategies for Networked Malware Detection and RemediationYue Yu, Michael Fry, Bernhard Plattner, Paul Smith, Alberto E. Schaeffer Filho. 233-247 [doi]
- Detecting Spammers via Aggregated Historical Data SetEitan Menahem, Rami Pusiz, Yuval Elovici. 248-262 [doi]
- Operating System Kernel Data Disambiguation to Support Security AnalysisAmani S. Ibrahim, John Grundy, James H. Hamlyn-Harris, Mohamed Almorsy. 263-276 [doi]
- FlexCOS: An Open Smartcard Platform for Research and EducationKristian Beilke, Volker Roth. 277-290 [doi]
- Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online GamesWilly Susilo, Yang-Wai Chow, Rungrat Wiangsripanawan. 291-304 [doi]
- Proof of Possession for Cloud Storage via Lagrangian Interpolation TechniquesLukasz Krzywiecki, Miroslaw Kutylowski. 305-319 [doi]
- Practical Certificateless Public Key Encryption in the Standard ModelWenjie Yang, Futai Zhang, Limin Shen. 320-333 [doi]
- (Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key AttackYunmei Zhang, Man Ho Au, Guomin Yang, Willy Susilo. 334-347 [doi]
- Direct CCA Secure Identity-Based Broadcast EncryptionLeyou Zhang, Qing Wu, Yupu Hu. 348-360 [doi]
- A Communication Efficient Group Key Distribution Scheme for MANETsYang Yang. 361-372 [doi]
- Cryptanalysis of Exhaustive Search on Attacking RSAMu-En Wu, Raylin Tso, Hung-Min Sun. 373-379 [doi]
- On the Improvement of Fermat FactorizationMu-En Wu, Raylin Tso, Hung-Min Sun. 380-391 [doi]
- Impossible Differential Cryptanalysis on Tweaked E2Yuechuan Wei, Xiaoyuan Yang, Chao Li, Weidong Du. 392-404 [doi]
- Linear Cryptanalysis and Security Tradeoff of Block Ciphering Systems with Channel ErrorsJing Guo, Zhuxiao Wang. 405-416 [doi]
- Differential Privacy Data Release through Adding Noise on Average ValueXilin Zhang, Yingjie Wu, Xiaodong Wang. 417-429 [doi]
- Private Friends on a Social Networking Site Operated by an Overly Curious SNPRoman Schlegel, Duncan S. Wong. 430-444 [doi]
- Selective and Confidential Message Exchange in Vehicular Ad Hoc NetworksSushama Karumanchi, Anna Cinzia Squicciarini, Dan Lin. 445-461 [doi]
- Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server ArchitectureDing Wang, Chunguang Ma, De-li Gu, Zhen-shan Cui. 462-475 [doi]
- A Secure and Private RFID Authentication Protocol under SLPN ProblemMohammad Saiful Islam Mamun, Atsuko Miyaji, Mohammad Shahriar Rahman. 476-489 [doi]
- Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid CloudJingwei Li, Jin Li, Xiaofeng Chen 0001, Chunfu Jia, Zheli Liu. 490-502 [doi]
- Masque: Access Control for Interactive Sharing of Encrypted Data in Social NetworksHuimin Shuai, Wen Tao Zhu. 503-515 [doi]
- Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC)Nima Mousavi, Mahesh V. Tripunitara. 516-529 [doi]