Abstract is missing.
- Defending against Heap Overflow by Using Randomization in Nested Virtual ClustersChee Meng Tey, Debin Gao. 1-16 [doi]
- VTOS: Research on Methodology of "Light-Weight" Formal Design and Verification for Microkernel OSZhenjiang Qian, Hao Huang, Fangmin Song. 17-32 [doi]
- Defeat Information Leakage from Browser Extensions via Data ObfuscationWentao Chang, Songqing Chen. 33-48 [doi]
- Rating Web Pages Using Page-Transition EvidenceJian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang. 49-58 [doi]
- OSNGuard: Detecting Worms with User Interaction Traces in Online Social NetworksLiang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang, Huipeng Fang. 59-74 [doi]
- A Secure and Efficient Scheme for Cloud Storage against EavesdropperJian Liu, Huimei Wang, Ming-xian, Kun Huang. 75-89 [doi]
- Secure and Private Outsourcing of Shape-Based Feature ExtractionShumiao Wang, Mohamed Nassar, Mikhail J. Atallah, Qutaibah M. Malluhi. 90-99 [doi]
- Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its CountermeasuresHong Rong, Ming-xian, Huimei Wang, Jiangyong Shi. 100-112 [doi]
- Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based AttacksSmitha Sundareswaran, Anna Cinzia Squicciarini. 113-124 [doi]
- A Covert Channel Using Event Channel State on Xen HypervisorQingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu. 125-134 [doi]
- Type-Based Analysis of Protected Storage in the TPMJianxiong Shao, Dengguo Feng, Yu Qin. 135-150 [doi]
- Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number GeneratorsRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 151-166 [doi]
- Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard ModelXiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou. 167-184 [doi]
- Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard ModelZheng Yang. 185-193 [doi]
- XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan GenerationEunjung Yoon, Peng Liu. 194-212 [doi]
- PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh NetworksAmin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis. 213-228 [doi]
- Fingerprint Embedding: A Proactive Strategy of Detecting Timing ChannelsJing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing. 229-244 [doi]
- Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel CountermeasureAmir Moradi, Oliver Mischke. 245-258 [doi]
- EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising MethodsMingliang Feng, Yongbin Zhou, Zhenmei Yu. 259-274 [doi]
- Accelerating AES in JavaScript with WebGLYang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen. 275-287 [doi]
- Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff RevisitedWenhao Wang, Dongdai Lin. 288-301 [doi]
- Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor NodesZhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim. 302-317 [doi]
- Attacking and Fixing the CS ModeHan Sui, Wenling Wu, Liting Zhang, Peng Wang. 318-330 [doi]
- Integral Attacks on Reduced-Round PRESENTShengbao Wu, Mingsheng Wang. 331-345 [doi]
- Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size CiphertextY. Sreenivasa Rao, Ratna Dutta. 346-362 [doi]
- Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access StructureHuiling Qian, Jiguo Li, Yichen Zhang. 363-372 [doi]
- Toward Generic Method for Server-Aided CryptographySébastien Canard, Iwen Coisel, Julien Devigne, Cécilia Gallais, Thomas Peters, Olivier Sanders. 373-392 [doi]
- Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree OneZhi Hu, Lin Wang, MaoZhi Xu, Guoliang Zhang. 393-403 [doi]
- Threshold Secret Image SharingTeng Guo, Feng Liu, Chuan-Kun Wu, Ching-Nung Yang, Wen Wang, YaWei Ren. 404-412 [doi]