| 2013 | A Covert Channel Using Event Channel State on Xen Hypervisor. Qingni Shen, Mian Wan, Zhuangzhuang Zhang, Zhi Zhang, Sihan Qing, Zhonghai Wu |
| 2013 | A Secure and Efficient Scheme for Cloud Storage against Eavesdropper. Jian Liu, Huimei Wang, Ming Xian, Kun Huang |
| 2013 | Accelerating AES in JavaScript with WebGL. Yang Yang, Zhi Guan, Jiawei Zhu, Qiuxiang Dong, Zhong Chen |
| 2013 | Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited. Wenhao Wang, Dongdai Lin |
| 2013 | Attacking and Fixing the CS Mode. Han Sui, Wenling Wu, Liting Zhang, Peng Wang |
| 2013 | Comprehensive Evaluation of AES Dual Ciphers as a Side-Channel Countermeasure. Amir Moradi, Oliver Mischke |
| 2013 | Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext. Y. Sreenivasa Rao, Ratna Dutta |
| 2013 | Defeat Information Leakage from Browser Extensions via Data Obfuscation. Wentao Chang, Songqing Chen |
| 2013 | Defending against Heap Overflow by Using Randomization in Nested Virtual Clusters. Chee Meng Tey, Debin Gao |
| 2013 | Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks. Smitha Sundareswaran, Anna Cinzia Squicciarini |
| 2013 | Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou |
| 2013 | EMD-Based Denoising for Side-Channel Attacks and Relationships between the Noises Extracted with Different Denoising Methods. Mingliang Feng, Yongbin Zhou, Zhenmei Yu |
| 2013 | Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim |
| 2013 | Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Model. Zheng Yang |
| 2013 | Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels. Jing Wang, Peng Liu, Limin Liu, Le Guan, Jiwu Jing |
| 2013 | Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One. Zhi Hu, Lin Wang, Maozhi Xu, Guoliang Zhang |
| 2013 | Information and Communications Security - 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings Sihan Qing, Jianying Zhou, Dongmei Liu |
| 2013 | Integral Attacks on Reduced-Round PRESENT. Shengbao Wu, Mingsheng Wang |
| 2013 | OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks. Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang, Huipeng Fang |
| 2013 | PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh Networks. Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis |
| 2013 | Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure. Huiling Qian, Jiguo Li, Yichen Zhang |
| 2013 | Rating Web Pages Using Page-Transition Evidence. Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang |
| 2013 | Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
| 2013 | Secure and Private Outsourcing of Shape-Based Feature Extraction. Shumiao Wang, Mohamed Nassar, Mikhail J. Atallah, Qutaibah M. Malluhi |
| 2013 | Threshold Secret Image Sharing. Teng Guo, Feng Liu, Chuan Kun Wu, Ching-Nung Yang, Wen Wang, YaWei Ren |
| 2013 | Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures. Hong Rong, Ming Xian, Huimei Wang, Jiangyong Shi |
| 2013 | Toward Generic Method for Server-Aided Cryptography. Sébastien Canard, Iwen Coisel, Julien Devigne, Cécilia Gallais, Thomas Peters, Olivier Sanders |
| 2013 | Type-Based Analysis of Protected Storage in the TPM. Jianxiong Shao, Dengguo Feng, Yu Qin |
| 2013 | VTOS: Research on Methodology of "Light-Weight" Formal Design and Verification for Microkernel OS. Zhenjiang Qian, Hao Huang, Fangmin Song |
| 2013 | XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generation. Eunjung Yoon, Peng Liu |