| 2014 | A CAPTCHA Scheme Based on the Identification of Character Locations. Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo |
| 2014 | A Methodology for Hook-Based Kernel Level Rootkits. Chien-Ming Chen, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun |
| 2014 | A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo |
| 2014 | A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm. Chenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu |
| 2014 | A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience. Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer |
| 2014 | A Website Credibility Assessment Scheme Based on Page Association. Pei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei |
| 2014 | ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage. Mingwu Zhang |
| 2014 | Access Control in and Around the Browser. Dieter Gollmann |
| 2014 | An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu |
| 2014 | Attribute-Based Signature with Message Recovery. Kefeng Wang, Yi Mu, Willy Susilo, Fuchun Guo |
| 2014 | Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model. Weijin Wang, Yu Qin, Dengguo Feng |
| 2014 | Data Security and Privacy in the Cloud. Pierangela Samarati |
| 2014 | Detecting Frame Deletion in H.264 Video. Hongmei Liu, Songtao Li, Shan Bian |
| 2014 | Distributed Pseudo-Random Number Generation and Its Application to Cloud Database. Jiageng Chen, Atsuko Miyaji, Chunhua Su |
| 2014 | Efficient Adaptive Oblivious Transfer in UC Framework. Vandana Guleria, Ratna Dutta |
| 2014 | Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs. Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng |
| 2014 | Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. Fei Tang, Hongda Li, Qihua Niu, Bei Liang |
| 2014 | Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing. Mehrdad Nojoumian, Douglas R. Stinson |
| 2014 | Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis. Danhui Wang, An Wang, Xuexin Zheng |
| 2014 | Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Lukasz Krzywiecki |
| 2014 | HDROP: Detecting ROP Attacks Using Performance Monitoring Counters. Hongwei Zhou, Xin Wu, Wenchang Shi, Jinhui Yuan, Bin Liang |
| 2014 | High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit. Shujie Cui, Johann Großschädl, Zhe Liu, Qiuliang Xu |
| 2014 | Implementing a Covert Timing Channel Based on Mimic Function. Jing Wang, Le Guan, Limin Liu, Daren Zha |
| 2014 | Improved Preimage Attacks against Reduced HAS-160. Ronglin Hao, Bao Li, Bingke Ma, Xiaoqian Li |
| 2014 | Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures. Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia |
| 2014 | Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools. Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache |
| 2014 | Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings Xinyi Huang, Jianying Zhou |
| 2014 | Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups. Jie Zhang, Futai Zhang |
| 2014 | Modular Inversion Hidden Number Problem Revisited. Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng |
| 2014 | Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes. Jun Zhang, Xinran Li, Fang-Wei Fu |
| 2014 | Multi-recipient Encryption in Heterogeneous Setting. Puwen Wei, Yuliang Zheng, Wei Wang |
| 2014 | New Variants of Lattice Problems and Their NP-Hardness. Wulu Li |
| 2014 | Obfuscating Encrypted Web Traffic with Combined Objects. Yi Tang, Piaoping Lin, Zhaokai Luo |
| 2014 | On Constructions of Circulant MDS Matrices for Lightweight Cryptography. Kishan Chand Gupta, Indranil Ghosh Ray |
| 2014 | On the Recursive Construction of MDS Matrices for Lightweight Cryptography. Hong Xu, Lin Tan, Xuejia Lai |
| 2014 | Precise Instruction-Level Side Channel Profiling of Embedded Processors. Mehari Msgna, Konstantinos Markantonakis, Keith Mayes |
| 2014 | Preserving Receiver-Location Privacy in Wireless Sensor Networks. Javier López, Ruben Rios, Jorge Cuéllar |
| 2014 | Proofs of Retrievability Based on MRD Codes. Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu |
| 2014 | Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement. Lei Zhang, Qianhong Wu, Bo Qin, Hua Deng, Jianwei Liu, Wenchang Shi |
| 2014 | SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine. Yonggan Hou, Jianwei Zhuge, Dan Xin, Wenya Feng |
| 2014 | TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu |
| 2014 | Two-Party (Blind) Ring Signatures and Their Applications. Man Ho Au, Willy Susilo |