| 2015 | Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers Lucas Chi Kwong Hui, S. H. Qing, Elaine Shi, Siu-Ming Yiu |
| 2014 | 4P_VES: A Collusion-Resistant Accountable Virtual Economy System. Hong Zhang, Xiaolei Dong, Zhenfu Cao, Jiachen Shen |
| 2014 | A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter. Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu |
| 2014 | A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation. Peeter Laud |
| 2014 | A Visual One-Time Password Authentication Scheme Using Mobile Devices. Yang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi |
| 2014 | Attribute Based Key-Insulated Signatures with Message Recovery. Y. Sreenivasa Rao, Ratna Dutta |
| 2014 | Distance Lower Bounding. Xifan Zheng, Reihaneh Safavi-Naini, Hadi Ahmadi |
| 2014 | Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework. Vandana Guleria, Ratna Dutta |
| 2014 | Error-Tolerant Algebraic Side-Channel Attacks Using BEE. Ling Song, Lei Hu, Siwei Sun, Zhang Zhang, Danping Shi, Ronglin Hao |
| 2014 | Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator. Yuechen Chen, Zoe Lin Jiang, Siu-Ming Yiu, Joseph K. Liu, Man Ho Au, Xuan Wang |
| 2014 | How to Compare Selections of Points of Interest for Side-Channel Distinguishers in Practice? Yingxian Zheng, Yongbin Zhou, Zhenmei Yu, Chengyu Hu, Hailong Zhang |
| 2014 | MOVTCHA: A CAPTCHA Based on Human Cognitive and Behavioral Features Analysis. Asadullah Al Galib, Reihaneh Safavi-Naini |
| 2014 | Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices. Qianying Zhang, Shijun Zhao, Li Xi, Wei Feng, Dengguo Feng |
| 2014 | Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Electromagnetic Radiation. Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang |
| 2014 | New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada |
| 2014 | Privacy-Preserving Distance-Bounding Proof-of-Knowledge. Ahmad Ahmadi, Reihaneh Safavi-Naini |
| 2014 | Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks. Yang Yang, Zhi Guan, Zhe Liu, Zhong Chen |
| 2014 | Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors. Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim |
| 2014 | SEDB: Building Secure Database Services for Sensitive Data. Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang |
| 2014 | Secure and Efficient Scheme for Delegation of Signing Rights. Rajeev Anand Sahu, Vishal Saraswat |
| 2014 | Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model. Yanfei Guo, Zhenfeng Zhang, Jiang Zhang, Xuexian Hu |
| 2014 | TagDroid: Hybrid SSL Certificate Verification in Android. Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li, Dawu Gu |
| 2014 | XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra. Sabyasachi Dutta, Avishek Adhikari |