| 2013 | 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng |
| 2013 | A group signature scheme with unbounded message-dependent opening. Kazuma Ohara, Yusuke Sakai, Keita Emura, Goichiro Hanaoka |
| 2013 | An efficient and probabilistic secure bit-decomposition. Bharath K. Samanthula, Hu Chun, Wei Jiang |
| 2013 | An empirical study on the software integrity of virtual appliances: are you really getting what you paid for? Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell |
| 2013 | An information-flow type-system for mixed protocol secure computation. Florian Kerschbaum |
| 2013 | Anonymous attribute-based encryption supporting efficient decryption test. Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li |
| 2013 | AppInk: watermarking android apps for repackaging deterrence. Wu Zhou, Xinwen Zhang, Xuxian Jiang |
| 2013 | Attribute-based fine-grained access control with efficient revocation in cloud storage systems. Kan Yang, Xiaohua Jia, Kui Ren |
| 2013 | Bind your phone number with caution: automated user profiling through address book matching on smartphone. Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng |
| 2013 | Blank digital signatures. Christian Hanser, Daniel Slamanig |
| 2013 | Boolean symmetric searchable encryption. Tarik Moataz, Abdullatif Shikfa |
| 2013 | Comparative study of multicast authentication schemes with application to wide-area measurement system. Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami |
| 2013 | Covert computation: hiding code in code for obfuscation purposes. Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl |
| 2013 | Data-oblivious graph algorithms for secure computation and outsourcing. Marina Blanton, Aaron Steele, Mehrdad Aliasgari |
| 2013 | Defining verifiability in e-auction protocols. Jannik Dreier, Hugo Jonker, Pascal Lafourcade |
| 2013 | Designing leakage-resilient password entry on touchscreen mobile devices. Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng |
| 2013 | DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware. Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie |
| 2013 | DroidChameleon: evaluating Android anti-malware against transformation attacks. Vaibhav Rastogi, Yan Chen, Xuxian Jiang |
| 2013 | Dynamix: anonymity on dynamic social structures. Abedelaziz Mohaisen, Yongdae Kim |
| 2013 | Efficient dynamic provable possession of remote data via balanced update trees. Yihua Zhang, Marina Blanton |
| 2013 | Efficient user-space information flow control. Ben Niu, Gang Tan |
| 2013 | Enforcing system-wide control flow integrity for exploit detection and diagnosis. Aravind Prakash, Heng Yin, Zhenkai Liang |
| 2013 | Expressive search on encrypted data. Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen |
| 2013 | Faster secure two-party computation with less memory. Wilko Henecka, Thomas Schneider |
| 2013 | Fuzzing the ActionScript virtual machine. Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang |
| 2013 | Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi |
| 2013 | Horizon extender: long-term preservation of data leakage evidence in web traffic. David Gugelmann, Dominik Schatzmann, Vincent Lenders |
| 2013 | LogicScope: automatic discovery of logic vulnerabilities within web applications. Xiaowei Li, Yuan Xue |
| 2013 | Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection. Davide Maiorca, Igino Corona, Giorgio Giacinto |
| 2013 | Multi-channel broadcast encryption. Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh |
| 2013 | Multi-key leakage-resilient threshold cryptography. Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He |
| 2013 | On the effectiveness of API-level access control using bytecode rewriting in Android. Hao Hao, Vicky Singh, Wenliang Du |
| 2013 | On the feasibility of inference attacks by third-party extensions to social network systems. Seyed Hossein Ahmadinejad, Philip W. L. Fong |
| 2013 | PSiOS: bring your own privacy & security to iOS devices. Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz |
| 2013 | Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism. Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama |
| 2013 | Practical verification of WPA-TKIP vulnerabilities. Mathy Vanhoef, Frank Piessens |
| 2013 | Privacy settings in social networking systems: what you cannot control. Amirreza Masoumzadeh, James Joshi |
| 2013 | Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li |
| 2013 | Privacy-preserving smart metering with regional statistics and personal enquiry services. Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou |
| 2013 | Proof of plaintext knowledge for code-based public-key encryption revisited. Rong Hu, Kirill Morozov, Tsuyoshi Takagi |
| 2013 | Protecting access privacy of cached contents in information centric networks. Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim |
| 2013 | Protecting function pointers in binary. Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres |
| 2013 | Protecting privacy by sanitizing personal data: a new approach to anonymous credentials. Sébastien Canard, Roch Lescuyer |
| 2013 | Pseudorandom signatures. Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering |
| 2013 | Robust network traffic identification with unknown applications. Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou |
| 2013 | STRIDE: sanctuary trail - refuge from internet DDoS entrapment. Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig |
| 2013 | SecLaaS: secure logging-as-a-service for cloud forensics. Shams Zawoad, Amit Kumar Dutta, Ragib Hasan |
| 2013 | Secure cloud-assisted location based reminder. Xinxin Zhao, Lingjun Li, Guoliang Xue |
| 2013 | Sensing-enabled channels for hard-to-detect command and control of mobile devices. Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart |
| 2013 | SocialWatch: detection of online service abuse via large-scale social graphs. Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao |
| 2013 | TabShots: client-side detection of tabnabbing attacks. Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen |
| 2013 | The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities. Viet Hung Nguyen, Fabio Massacci |
| 2013 | The role and effectiveness of cryptography in network virtualization: a position paper. Wenbo Mao |
| 2013 | Time evolving graphical password for securing mobile devices. Zhan Wang, Jiwu Jing, Liang Li |
| 2013 | Towards asymmetric searchable encryption with message recovery and flexible search authorization. Qiang Tang, Xiaofeng Chen |
| 2013 | Towards fully incremental cryptographic schemes. Kevin Atighehchi, Traian Muntean |
| 2013 | Towards preventing QR code based attacks on android phone using security warnings. Huiping Yao, Dongwan Shin |
| 2013 | Trustworthy distributed computing on social networks. Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim |
| 2013 | Verifiable and private top-k monitoring. Xuhua Ding, HweeHwa Pang, Junzuo Lai |
| 2013 | Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. Jia Xu, Ee-Chien Chang, Jianying Zhou |
| 2013 | Your love is public now: questioning the use of personal information in authentication. Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao |