| 2013 | A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang |
| 2013 | A Digital Forensic Framework for Automated User Activity Reconstruction. Jungin Kang, Sangwook Lee, Heejo Lee |
| 2013 | About Hash into Montgomery Form Elliptic Curves. Wei Yu, Kunpeng Wang, Bao Li, Song Tian |
| 2013 | Accountable Trapdoor Sanitizable Signatures. Junzuo Lai, Xuhua Ding, Yongdong Wu |
| 2013 | Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks. Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg |
| 2013 | Attribute Specified Identity-Based Encryption. Hao Xiong, Tsz Hon Yuen, Cong Zhang, Yi Jun He, Siu-Ming Yiu |
| 2013 | Cryptanalysis of the OKH Authenticated Encryption Scheme. Peng Wang, Wenling Wu, Liting Zhang |
| 2013 | Efficient Attack Detection Based on a Compressed Model. Shichao Jin, Okhee Kim, Tieming Chen |
| 2013 | Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection. Yuxin Meng, Lam-for Kwok |
| 2013 | Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control. Xiaofan Liu, Natasha Alechina, Brian Logan |
| 2013 | Identity-Based Multisignature with Message Recovery. Kefeng Wang, Yi Mu, Willy Susilo |
| 2013 | Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher. Ling Song, Lei Hu |
| 2013 | Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme. Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei |
| 2013 | Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware. Jairo Serrano, Eduardo César, Elisa Heymann, Barton P. Miller |
| 2013 | Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings Robert H. Deng, Tao Feng |
| 2013 | Joint Triple-Base Number System for Multi-Scalar Multiplication. Wei Yu, Kunpeng Wang, Bao Li, Song Tian |
| 2013 | Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong |
| 2013 | Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu |
| 2013 | Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model. Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang |
| 2013 | Secure Content Delivery in DRM System with Consumer Privacy. Dheerendra Mishra, Sourav Mukhopadhyay |
| 2013 | Secure RFID Ownership Transfer Protocols. Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan |
| 2013 | Security Evaluation of Rakaposhi Stream Cipher. Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld |
| 2013 | Simplified PACE|AA Protocol. Lucjan Hanzlik, Lukasz Krzywiecki, Miroslaw Kutylowski |
| 2013 | Situational Awareness for Improving Network Resilience Management. Mixia Liu, Tao Feng, Paul Smith, David Hutchison |
| 2013 | Software Protection with Obfuscation and Encryption. Vivek Balachandran, Sabu Emmanuel |
| 2013 | Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers. Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang |
| 2013 | Trusted Identity Management for Overlay Networks. Stefan Kraxberger, Ronald Toegl, Martin Pirker, Elisa Pintado Guijarro, Guillermo Garcia Millan |
| 2013 | VulLocator: Automatically Locating Vulnerable Code in Binary Programs. Yingjun Zhang, Kai Chen, Yifeng Lian |