Abstract is missing.
- While Mobile Encounters with CloudsMan Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu. 3-18 [doi]
- Multi-device Anonymous AuthenticationKamil Kluczniak, Jianfeng Wang, Xiaofeng Chen 0001, Miroslaw Kutylowski. 21-36 [doi]
- A Mobile Device-Based Antishoulder-Surfing Identity Authentication MechanismJia-Ning Luo, Ming-Hour Yang, Cho-Luen Tsai. 37-46 [doi]
- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless CommunicationsChang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun. 47-61 [doi]
- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud ComputingKai He, Jian Weng, Joseph K. Liu, Wanlei Zhou, Jianan Liu. 65-79 [doi]
- An Energy-Efficient Task Scheduling Heuristic Algorithm Without Virtual Machine Migration in Real-Time Cloud EnvironmentsYi Zhang, Liuhua Chen, Haiying Shen, Xiaohui Cheng. 80-97 [doi]
- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud PlatformsShashank Gupta, Brij B. Gupta. 98-109 [doi]
- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content SecurityJinshuo Liu, Yabo Xu, Juan Deng, Lina Wang, Lanxin Zhang. 113-125 [doi]
- Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the TradeZisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Stefanos Gritzalis. 126-139 [doi]
- Two-in-One Oblivious Signatures Secure in the Random Oracle ModelRaylin Tso. 143-155 [doi]
- A New Transitive Signature SchemeChao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo. 156-167 [doi]
- Privacy-Preserving Profile Matching Protocol Considering ConditionsYosuke Ishikuro, Kazumasa Omote. 171-183 [doi]
- Privacy Preserving Credit SystemsSherman S. M. Chow, Russell W. F. Lai, Xiuhua Wang, Yongjun Zhao. 184-199 [doi]
- Evading System-Calls Based Intrusion Detection SystemsIshai Rosenberg, Ehud Gudes. 200-216 [doi]
- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free AttacksToshihiro Yamauchi, Yuta Ikegami. 219-234 [doi]
- Timestamp Analysis for Quality Validation of Network Forensic DataNikolai Hampton, Zubair A. Baig. 235-248 [doi]
- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple KeywordsTingting Wang, Man Ho Au, Wei Wu. 251-265 [doi]
- Searchable Symmetric Encryption Supporting Queries with Multiple-Character WildcardsFangming Zhao, Takashi Nishide. 266-282 [doi]
- A System of Shareable Keyword Search on Encrypted DataWei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun. 283-299 [doi]
- An Attribute-Based Protection Model for JSON DocumentsProsunjit Biswas, Ravi S. Sandhu, Ram Krishnan. 303-317 [doi]
- The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute AssignmentMaanak Gupta, Ravi Sandhu. 318-332 [doi]
- On the Relationship Between Finite Domain ABAM and PreUCON \mathrm _A AAsma Alshehri, Ravi Sandhu. 333-346 [doi]
- Matrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix MultiplicationGang Sheng, Chunming Tang, Wei Gao, Ying Yin. 349-362 [doi]
- Expressive Rating Scheme by Signatures with Predications on RateesHiroaki Anada, Sushmita Ruj, Kouichi Sakurai. 363-379 [doi]
- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream CiphersMin Hsuan Cheng, Reza Sedaghat, Prathap Siddavaatam. 383-397 [doi]
- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneRQianqian Yang, Lei Hu, Siwei Sun, Ling Song. 398-411 [doi]
- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access PatternQiumao Ma, Wensheng Zhang, Jinsheng Zhang. 415-432 [doi]
- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection NetworksWenjuan Li, Weizhi Meng, Lam-for Kwok, Horace Ho-Shing Ip. 433-449 [doi]
- Iris Cancellable Template Generation Based on Indexing-First-One HashingYen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai, Wun-She Yap. 450-463 [doi]
- Detecting Malicious URLs Using Lexical AnalysisMohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani. 467-482 [doi]
- Gatekeeping Behavior Analysis for Information Credibility Assessment on WeiboBailin Xie, Yu Wang, Chao Chen, Yang Xiang. 483-496 [doi]
- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern MiningAnisur Rahman, Yue Xu, Kenneth Radke, Ernest Foo. 499-506 [doi]
- Improved Security Proof for Modular Exponentiation BitsKewei Lv, Wenjie Qin, Ke Wang. 509-516 [doi]
- Secure Outsourced Bilinear Pairings Computation for Mobile DevicesTomasz Hyla, Jerzy Pejas. 519-529 [doi]
- The Design and Implementation of Multi-dimensional Bloom Filter Storage MatrixFei Xu, Pinxin Liu, Jianfeng Yang, Jing Xu. 530-538 [doi]