Abstract is missing.
- Secure Scheme Against Compromised Hash in Proof-of-Work BlockchainFengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, Ning Ding. 1-15 [doi]
- Analysis on the Block Reward of Fork After Withholding (FAW)Junming Ke, Han Jiang, Xiangfu Song, Shengnan Zhao, Hao Wang, Qiuliang Xu. 16-31 [doi]
- Adding Confidential Transactions to Cryptocurrency IOTA with BulletproofsPeter Ince, Joseph K. Liu, Peng Zhang. 32-45 [doi]
- Burn After Reading: Expunging Execution Footprints of Android AppsJunliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu. 46-63 [doi]
- A Comprehensive Study of Permission Usage on AndroidYemian Lu, Qi Li 0002, Purui Su, Juan Pan, Jia Yan, Pengyi Zhan, Wei Guo. 64-79 [doi]
- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile DevicesDennis Y. W. Liu, Chi Tsiu Tong, Winnie W. M. Lam. 80-94 [doi]
- Anonymous Attribute-Based Conditional Proxy Re-encryptionXianping Mao, Xuefeng Li, Xiaochuan Wu, Chuansheng Wang, Junzuo Lai. 95-110 [doi]
- A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger AnonymityXiaoyan Yang, Han Jiang, Mengbo Hou, Zhihua Zheng, Qiuliang Xu, Kim-Kwang Raymond Choo. 111-124 [doi]
- Multi-user Forward Secure Dynamic Searchable Symmetric EncryptionQiao Wang, Yu Guo, Hejiao Huang, Xiaohua Jia. 125-140 [doi]
- Towards Security Authentication for IoT Devices with Lattice-Based ZKJie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, Minghao Zhao, Hao Wang. 141-150 [doi]
- Secure Semantic Search Based on Two-Level Index Over Encrypted CloudLili Xia, Zhangjie Fu. 151-159 [doi]
- Fast QuadTree-Based Pose Estimation for Security Applications Using Face BiometricsPaola Barra, Carmen Bisogni, Michele Nappi, Stefano Ricciardi. 160-173 [doi]
- Walking on the Cloud: Gait Recognition, a Wearable SolutionAniello Castiglione, Kim-Kwang Raymond Choo, Maria De Marsico, Alessio Mecca. 174-186 [doi]
- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access ControlNesrine Kaaniche, Sana Belguith, Giovanni Russello. 187-201 [doi]
- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access ControlAhmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Ahmed Al-Mansoori. 202-211 [doi]
- Continuous Authentication on Smartphone by Means of Periocular and Virtual KeystrokeSilvio Barra, Mirko Marras, Gianni Fenu. 212-220 [doi]
- Real-Time IoT Device Activity Detection in Edge NetworksIbbad Hafeez, Aaron Yi Ding, Markku Antikainen, Sasu Tarkoma. 221-236 [doi]
- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFiYunfang Chen, Yihong Zhu, Hao Zhou, Wei Chen, Wei Zhang. 237-250 [doi]
- Analyzing the Communication Security Between Smartphones and IoT Based on CORASMotalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, Christian Damsgaard Jensen. 251-265 [doi]
- Vulnerability Assessment for Unmanned Systems Autonomy Services ArchitectureYu Li, Ivan Frasure, Ademola Ayodeji Ikusan, Junjie Zhang, Rui Dai. 266-276 [doi]
- LA ^3 : A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained DevicesWensheng Zhang, Chuang Wang. 277-287 [doi]
- An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETsJinhui Liu, Yong Yu, Yanqi Zhao, Jianwei Jia, Shijia Wang. 288-303 [doi]
- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web SearchFrancisco-Javier Rodrigo-Ginés, Javier Parra-Arnau, Weizhi Meng, Yu Wang. 304-318 [doi]
- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of ShadowsocksYankang Zhao, Xiaobo Ma, Jianfeng Li, Shui Yu, Wei Li. 319-336 [doi]
- User Relationship Classification of Facebook Messenger Mobile Data using WEKAAmber Umair, Priyadarsi Nanda, Xiangjian He, Kim-Kwang Raymond Choo. 337-348 [doi]
- Using Software Visualization for Supporting the Teaching of MapReduceUmberto Ferraro Petrillo. 349-360 [doi]
- DBAF: Dynamic Binary Analysis Framework and Its ApplicationsTing Chen 0002, Youzheng Feng, Xingwei Lin, Zihao Li, Xiaosong Zhang. 361-375 [doi]
- Context-Aware Failure-Oblivious Computing as a Means of Preventing Buffer OverflowsManuel Rigger, Daniel Pekarek, Hanspeter Mössenböck. 376-390 [doi]
- ATPG Binning and SAT-Based Approach to Hardware Trojan Detection for Safety-Critical SystemsAnimesh Basakchowdhury, Ansuman Banerjee, Bhargab B. Bhattacharya. 391-410 [doi]
- Android Malware Detection Methods Based on the Combination of Clustering and ClassificationZhi Xiong, Ting Guo, Qinkun Zhang, Yu Cheng, Kai Xu. 411-422 [doi]
- An OpenvSwitch Extension for SDN TracebackDanni Ren, Wenti Jiang, Huakang Li, Guozi Sun. 423-435 [doi]
- Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding AttacksJiahao Peng, Xiaobo Ma, Jianfeng Li, Lei Xue, Wenjun Hu. 436-451 [doi]
- Creating and Managing Realism in the Next-Generation Cyber RangeDragos-George Ionica, Florin Pop, Aniello Castiglione. 452-462 [doi]
- Understanding the Behaviors of BGP-based DDoS Protection ServicesTony Miu Tung, Chenxu Wang, Jinhe Wang. 463-473 [doi]
- Position Paper on Blockchain Technology: Smart Contract and ApplicationsWeizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li 0002, Yongjun Zhao 0001, Sherman S. M. Chow. 474-483 [doi]
- Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoTJunbin Fang, Yun-Ju Huang, Frankie Li, Jing Li, Xuan Wang, Yang Xiang. 484-490 [doi]