Abstract is missing.
- Anonymous IBE from Quadratic Residuosity with Fast EncryptionXiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jinwen Zheng. 3-19 [doi]
- Time-Specific SignaturesMasahito Ishizaka, Shinsaku Kiyomoto. 20-38 [doi]
- Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoTRouzbeh Behnia, Attila Altay Yavuz, Muslum Ozgur Ozmen, Tsz Hon Yuen. 39-58 [doi]
- Public-PEZ CryptographySoma Murata, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone. 59-74 [doi]
- Two-Server Verifiable Homomorphic Secret Sharing for High-Degree PolynomialsXin Chen, Liang Feng Zhang. 75-91 [doi]
- Searching for Balanced S-Boxes with High Nonlinearity, Low Differential Uniformity, and Improved DPA-ResistanceYoule Xu, Qichun Wang. 95-106 [doi]
- Integerwise Functional Bootstrapping on TFHEHiroki Okada, Shinsaku Kiyomoto, Carlos Cid. 107-125 [doi]
- Rotational Cryptanalysis of Salsa Core FunctionRyoma Ito. 129-145 [doi]
- Analyzing the Chain of Trust Model Based on Entity DependenceGe Cheng, Hui Xie, Dongliang Zhang. 146-159 [doi]
- Evaluation on the Security of Commercial Cloud Container ServicesYifei Wu, Lingguang Lei, Yuewu Wang, Kun Sun 0001, Jingzi Meng. 160-177 [doi]
- Walls Have Ears: Eavesdropping User Behaviors via Graphics-Interrupt-Based Side ChannelHaoyu Ma, Jianwen Tian, Debin Gao, Chunfu Jia. 178-195 [doi]
- Why Current Statistical Approaches to Ransomware Detection FailJamie Pont, Budi Arief, Julio Hernandez-Castro. 199-216 [doi]
- A Framework for Estimating Privacy Risk Scores of Mobile AppsKai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber. 217-233 [doi]
- On the Struggle Bus: A Detailed Security Analysis of the m-tickets AppJorge Sanz Maroto, Haoyu Liu, Paul Patras. 234-252 [doi]
- ELD: Adaptive Detection of Malicious Nodes under Mix-Energy-Depleting-Attacks Using Edge Learning in IoT NetworksZuchao Ma, Liang Liu 0006, Weizhi Meng. 255-273 [doi]
- Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic ConstraintsSaihua Cai, Jinfu Chen, Xinru Li, Bo Liu. 274-289 [doi]
- Towards Transparent Control-Flow Integrity in Safety-Critical SystemsDon Kuzhiyelil, Philipp Zieris, Marine Kadar, Sergey Tverdyshev, Gerhard Fohler. 290-311 [doi]
- BlockVoke - Fast, Blockchain-Based Certificate Revocation for PKIs and the Web of TrustAbba Garba, Arne Bochem, Benjamin Leiding. 315-333 [doi]
- Formalizing Bitcoin Crashes with Universally Composable SecurityJunming Ke, Pawel Szalachowski, Jianying Zhou 0001, Qiuliang Xu. 334-351 [doi]
- Characterizing Erasable Accounts in EthereumXiaoqi Li, Ting Chen 0002, Xiapu Luo, Jiangshan Yu. 352-371 [doi]
- An Accountable Decryption System Based on Privacy-Preserving Smart ContractsRujia Li, Qin Wang, Feng Liu, Qi Wang 0012, David Galindo. 372-390 [doi]
- PvP: Profiling Versus Player! Exploiting Gaming Data for Player RecognitionMauro Conti, Pier Paolo Tricomi. 393-408 [doi]
- Privacy-Preserving Computation of the Earth Mover's DistanceAlberto Blanco-Justicia, Josep Domingo-Ferrer. 409-423 [doi]