Abstract is missing.
- Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and NonrepudiationGang Yu, Zhenfu Cao, Guang Zeng, Wenbao Han. 3-18 [doi]
- An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access StructuresHui Cui, Robert H. Deng, Guowei Wu, Junzuo Lai. 19-38 [doi]
- Ciphertext-Policy Attribute Based Encryption Supporting Access Policy UpdateYinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo. 39-60 [doi]
- Universally Composable Cryptographic Role-Based Access ControlBin Liu, Bogdan Warinschi. 61-80 [doi]
- ID-based Data Integrity Auditing Scheme from RSA with Resisting Key ExposureJianhong Zhang, Pengyan Li, Zhibin Sun, Jian Mao. 83-100 [doi]
- Efficient Dynamic Provable Data Possession from Dynamic Binary TreeChangfeng Li, Huaqun Wang. 101-111 [doi]
- Identity-Based Batch Provable Data PossessionFucai Zhou, Su Peng, Jian Xu, Zifeng Xu. 112-129 [doi]
- Secure Naïve Bayesian Classification over Encrypted Data in CloudXingxin Li, Youwen Zhu, Jian Wang. 130-150 [doi]
- Integrity Preserving Multi-keyword Searchable Encryption for Cloud ComputingFucai Zhou, Yuxi Li, Alex X. Liu, Muqing Lin, Zifeng Xu. 153-172 [doi]
- Oblivious Keyword Search with AuthorizationPeng Jiang, Xiaofen Wang, Jianchang Lai, Fuchun Guo, Rongmao Chen. 173-190 [doi]
- Efficient Asymmetric Index Encapsulation Scheme for Named DataRong Ma, Zhenfu Cao. 191-203 [doi]
- Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure ConstructionKazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto. 207-226 [doi]
- One-Round Attribute-Based Key Exchange in the Multi-party SettingYangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang, Yong Yu. 227-243 [doi]
- Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short MessageYong Xie, Libing Wu, Yubo Zhang, Zhiyan Xu. 244-254 [doi]
- Integrity Analysis of Authenticated Encryption Based on Stream CiphersKazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata. 257-276 [doi]
- Secure and Efficient Construction of Broadcast Encryption with DealershipKamalesh Acharya, Ratna Dutta. 277-295 [doi]
- Towards Certificate-Based Group EncryptionYili Ren, Xiling Luo, Qianhong Wu, Joseph K. Liu, Peng Zhang. 296-305 [doi]
- Updatable Lossy Trapdoor Functions and Its Application in Continuous LeakageSujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang. 309-319 [doi]
- A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage ModelJianye Huang, Qiong Huang, Chunhua Pan. 320-339 [doi]
- Towards Proofs of Ownership Beyond Bounded LeakageYongjun Zhao, Sherman S. M. Chow. 340-350 [doi]
- A Homomorphic Proxy Re-encryption from LatticesChunguang Ma, Juyan Li, Weiping Ouyang. 353-372 [doi]
- Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption SchemeZengpeng Li, Steven D. Galbraith, Chunguang Ma. 373-383 [doi]
- A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress)Jun Gao, Jiaqi Wang, Ning Lu, Fang Zhu, Wenbo Shi. 384-391 [doi]