Abstract is missing.
- An Approach for the Automated Analysis of Network Access Controls in Cloud Computing InfrastructuresThibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. 1-14 [doi]
- Adopting Provenance-Based Access Control in OpenStack Cloud IaaSDang Nguyen 0001, Jaehong Park, Ravi S. Sandhu. 15-27 [doi]
- Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud StorageYong Yu, Yi Mu, Jianbing Ni, Jiang Deng, Ke Huang. 28-40 [doi]
- A Formal Model for Isolation Management in Cloud Infrastructure-as-a-ServiceKhalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu. 41-53 [doi]
- Extending OpenStack Access Control with Domain TrustBo Tang, Ravi S. Sandhu. 54-69 [doi]
- Hierarchical Solution for Access Control and Authentication in Software Defined NetworksShuangyu He, Jianwei Liu, Jian Mao, Jie Chen. 70-81 [doi]
- A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud ComputingZhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu. 82-95 [doi]
- psOBJ: Defending against Traffic Analysis with pseudo-ObjectsYi Tang, Piaoping Lin, Zhaokai Luo. 96-109 [doi]
- Universally Composable Secure TNC Protocol Based on IF-T Binding to TLSShijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng. 110-123 [doi]
- Revisiting Node Injection of P2P BotnetJia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong, Dengguo Feng. 124-137 [doi]
- On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic ClassificationDi Wu, Xiao Chen, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou. 138-151 [doi]
- Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting AttackJakub Muszynski, Sébastien Varrette, Juan Luís Jiménez Laredo, Pascal Bouvry. 152-165 [doi]
- A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration TechniqueYonglin Hao, Dongxia Bai, Leibo Li. 166-183 [doi]
- Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlockJiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su. 184-197 [doi]
- Cryptanalysis on the Authenticated Cipher SablierXiutao Feng, Fan Zhang. 198-208 [doi]
- A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation TechniqueYumei Li, Holger Voos, Albert Rosich, Mohamed Darouach. 209-222 [doi]
- Security Analysis and Improvement of Femtocell Access ControlChien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu. 223-232 [doi]
- Identity Based Threshold Ring Signature from LatticesBaodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chong-zhi Gao. 233-245 [doi]
- Identity-Based Transitive SigncryptionShuquan Hou, Xinyi Huang, Li Xu. 246-259 [doi]
- GO-ABE: Group-Oriented Attribute-Based EncryptionMengting Li, Xinyi Huang, Joseph K. Liu, Li Xu. 260-270 [doi]
- Jhanwar-Barua's Identity-Based Encryption RevisitedIbrahim F. Elashry, Yi Mu, Willy Susilo. 271-284 [doi]
- Lightweight Universally Composable Adaptive Oblivious TransferVandana Guleria, Ratna Dutta. 285-298 [doi]
- Certificate-Based Conditional Proxy Re-EncryptionJiguo Li, Xuexia Zhao, Yichen Zhang. 299-310 [doi]
- A Secure Obfuscator for Encrypted Blind Signature FunctionalityXiao Feng, Zheng Yuan. 311-322 [doi]
- Attribute-Based Signing Right DelegationWeiwei Liu, Yi Mu, Guomin Yang. 323-334 [doi]
- Countering Ballot Stuffing and Incorporating Eligibility Verifiability in HeliosSriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider, Zhe Xia. 335-348 [doi]
- iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS ApplicationsYong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu. 349-362 [doi]
- Formal Verification of Finite State Transactional Security PolicyN. Rajamanickam, R. Nadarajan, Atilla Elçi. 363-376 [doi]
- Fingerprint Indexing Based on Combination of Novel Minutiae Triplet FeaturesWei Zhou, Jiankun Hu, Song Wang, Ian Petersen, Mohammed Bennamoun. 377-388 [doi]
- Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolHasini Gunasinghe, Elisa Bertino. 389-408 [doi]
- A Dynamic Matching Secret Handshake Scheme without Random OraclesYamin Wen, Zheng Gong. 409-420 [doi]
- Formal Analysis of DAA-Related APIs in TPM 2.0Li Xi, Dengguo Feng. 421-434 [doi]
- eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward SecrecyTapas Pandit, Rana Barua, Somanath Tripathy. 435-447 [doi]
- Efficient Sub-/Inter-Group Key Distribution for ad hoc NetworksBo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang. 448-461 [doi]
- A Novel Hybrid Key Revocation Scheme for Wireless Sensor NetworksMengmeng Ge, Kim-Kwang Raymond Choo. 462-475 [doi]
- Rational Secure Two-party Computation in Social CloudYilei Wang, Zhe Liu, Tao Li, Qiuliang Xu. 476-483 [doi]
- How to Evaluate Trust Using MMTKhalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli. 484-492 [doi]
- A Proposed Approach to Compound File Fragment IdentificationKhoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma. 493-500 [doi]
- Geo-Social-RBAC: A Location-Based Socially Aware Access Control FrameworkNathalie Baracaldo, Balaji Palanisamy, James B. D. Joshi. 501-509 [doi]
- A New Approach to Executable File Fragment Detection in Network ForensicsKhoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma. 510-517 [doi]
- Tighter Security Bound of MIBS Block Cipher against Differential AttackXiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan. 518-525 [doi]
- A New Multivariate Based Threshold Ring Signature SchemeJingwan Zhang, Yiming Zhao. 526-533 [doi]
- Capturing Android Malware Behaviour Using System Flow GraphRadoniaina Andriatsimandefitra, Valérie Viet Triem Tong. 534-541 [doi]
- Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LDMiao Xie, Jiankun Hu, Xinghuo Yu, Elizabeth Chang. 542-549 [doi]
- A New Public Key Encryption with Equality TestKaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun. 550-557 [doi]
- A Probabilistic Algebraic Attack on the Grain Family of Stream CiphersPratish Datta, Dibyendu Roy, Sourav Mukhopadhyay. 558-565 [doi]
- Multi-domain Direct Anonymous Attestation Scheme from PairingsLi Yang, Jianfeng Ma, Wei Wang, Chunjie Cao. 566-573 [doi]