Abstract is missing.
- Three Design Dimensions of Secure Embedded SystemsPatrick Schaumont, Aydin Aysu. 1-20 [doi]
- Investigating the Application of One Instruction Set Computing for Encrypted Data ComputationNektarios Georgios Tsoutsos, Michail Maniatakos. 21-37 [doi]
- Alphanumeric Shellcode Generator for ARM ArchitecturePratik Kumar, Nagendra Chowdary, Anish Mathuria. 38-39 [doi]
- SIMD-Based Implementations of Sieving in Integer-Factoring AlgorithmsBinanda Sengupta, Abhijit Das. 40-55 [doi]
- Strong Security and Privacy of RFID System for Internet of Things InfrastructureManik Lal Das. 56-69 [doi]
- Correlation-Immune Boolean Functions for Leakage Squeezing and Rotating S-Box Masking against Side Channel AttacksClaude Carlet. 70-74 [doi]
- A Time Series Approach for Profiling AttackLiran Lerman, Gianluca Bontempi, Souhaib Ben Taieb, Olivier Markowitch. 75-94 [doi]
- Algorithms for Switching between Boolean and Arithmetic Masking of Second OrderPraveen Kumar Vadnala, Johann Großschädl. 95-110 [doi]
- Identity-Based Identification Schemes from ID-KEMsPrateek Barapatre, Chandrasekaran Pandu Rangan. 111-129 [doi]
- Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without PairingsPrateek Barapatre, Chandrasekaran Pandu Rangan. 130-146 [doi]
- Dynamic Attribute Based Group Signature with Attribute Anonymity and Tracing in the Standard ModelSyed Taqi Ali, B. B. Amberker. 147-171 [doi]
- From Selective-ID to Full-ID IBS without Random OraclesSanjit Chatterjee, Chethan Kamath. 172-190 [doi]