| 2016 | A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds. Weijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang, Peng Liu |
| 2016 | A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun |
| 2016 | A Practical Scheme for Data Secure Transport in VoIP Conferencing. Dali Zhu, Renjun Zhang, Xiaozhuo Gu, Haitao Zhu |
| 2016 | A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li |
| 2016 | A Transparent Learning Approach for Attack Prediction Based on User Behavior Analysis. Peizhi Shao, Jiuming Lu, Raymond K. Wong, Wenzhuo Yang |
| 2016 | Application of Stylometry to DarkWeb Forum User Identification. Thanh Nghia Ho, Wee Keong Ng |
| 2016 | Assessment of Efficient Fingerprint Image Protection Principles Using Different Types of AFIS. Martin Draschl, Jutta Hämmerle-Uhl, Andreas Uhl |
| 2016 | Automated Security Proof of Cryptographic Support Commands in TPM 2.0. Weijin Wang, Yu Qin, Bo Yang, Yingjun Zhang, Dengguo Feng |
| 2016 | Compression-Based Integral Prior Classification for Improving Steganalysis. Viktor Monarev, Ilja Duplischev, Andrey Pestunov |
| 2016 | Differential Fault Analysis on Midori. Wei Cheng, Yongbin Zhou, Laurent Sauvage |
| 2016 | DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy. Shen Yan, Shiran Pan, Wen Tao Zhu, Keke Chen |
| 2016 | ECDSA on Things: IoT Integrity Protection in Practise. Johannes Bauer, Ralf C. Staudemeyer, Henrich C. Pöhls, Alexandros G. Fragkiadakis |
| 2016 | Group Verification Based Multiple-Differential Collision Attack. Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai |
| 2016 | How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity. Sumit Kumar Debnath, Ratna Dutta |
| 2016 | Identity in the Internet-of-Things (IoT): New Challenges and Opportunities. Kwok-Yan Lam, Chi-Hung Chi |
| 2016 | Information and Communications Security - 18th International Conference, ICICS 2016, Singapore, November 29 - December 2, 2016, Proceedings Kwok-Yan Lam, Chi-Hung Chi, Sihan Qing |
| 2016 | Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT. Christoph Frädrich, Henrich C. Pöhls, Wolfgang Popp, Noëlle Rakotondravony, Kai Samelin |
| 2016 | Is it Good or Bad? Disclosure of Medical Ailments on Twitter. B. S. Vidyalakshmi, Raymond K. Wong |
| 2016 | Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin |
| 2016 | Medical Record System Using Blockchain, Big Data and Tokenization. Paul Tak Shing Liu |
| 2016 | MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud. Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu |
| 2016 | Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study. Xin Wang, Neng Gao, Lingchen Zhang, Zongbin Liu, Lei Wang |
| 2016 | On the Robustness of Learning Parity with Noise. Nan Yao, Yu Yu, Xiangxue Li, Dawu Gu |
| 2016 | Optimizing Secure Computation Programs with Private Conditionals. Peeter Laud, Alisa Pankova |
| 2016 | Privacy Leakage via Attribute Inference in Directed Social Networks. Raymond K. Wong, B. S. Vidyalakshmi |
| 2016 | Private Boolean Query Processing on Encrypted Data. Hoang Giang Do, Wee Keong Ng |
| 2016 | Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVR. Bo Song, Yiming Zhao |
| 2016 | Research on Security Algorithm of Virtual Machine Live Migration for KVM Virtualization System. Wei Fan, Zhujun Zhang, Tingting Wang, Bo Hu, Sihan Qing, Degang Sun |
| 2016 | SECapacity: A Secure Capacity Scheduler in YARN. Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu |
| 2016 | The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight. Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu |
| 2016 | The Security of Individual Bit for XTR. Kewei Lv, Si-Wei Ren, Wenjie Qin |
| 2016 | The Threat of Virtualization: Hypervisor-Based Rootkits on the ARM Architecture. Robert Buhren, Julian Vetter, Jan Nordholz |
| 2016 | The Variant of Remote Set Problem on Lattices. Wenwen Wang, Kewei Lv, Jianing Liu |
| 2016 | Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds. Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin |
| 2016 | Towards Trustworthy Smart Cyber-Physical Systems. M. W. David, C. R. Yerkes, M. E. Simmons, W. Franceschini |
| 2016 | Vulnerability and Enhancement on Bluetooth Pairing and Link Key Generation Scheme for Security Modes 2 and 3. Da-Zhi Sun, Xiao-Hong Li |
| 2016 | Weaknesses in Security Considerations Related to Chaos-Based Image Encryption. Thomas Hütter, Mario Preishuber, Jutta Hämmerle-Uhl, Andreas Uhl |