| 2015 | A Framework for Analyzing Verifiability in Traditional and Electronic Exams. Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini |
| 2015 | A New Lattice-Based Threshold Attribute-Based Signature Scheme. Qingbin Wang, Shaozhen Chen, Aijun Ge |
| 2015 | A Rapid and Scalable Method for Android Application Repackaging Detection. Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, Dengguo Feng |
| 2015 | ADKAM: A-Diversity K-Anonymity Model via Microaggregation. Liang Cheng, Shaoyin Cheng, Fan Jiang |
| 2015 | Accelerating RSA with Fine-Grained Parallelism Using GPU. Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen |
| 2015 | Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method. Shantian Cheng, Juanyang Zhang |
| 2015 | Analysis of Fractional ωmbNAF for Scalar Multiplication. Weixuan Li, Wei Yu, Kunpeng Wang |
| 2015 | Batch Blind Signatures on Elliptic Curves. Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, Jianwei Liu |
| 2015 | Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI. Shaoyu Du, Zhenqi Li, Bin Zhang, Dongdai Lin |
| 2015 | Comprehensive Analysis of the Android Google Play's Auto-update Policy. Craig Sanders, Ayush Shah, Shengzhi Zhang |
| 2015 | Cramer-Shoup Like Chosen Ciphertext Security from LPN. Xiaochao Sun, Bao Li, Xianhui Lu |
| 2015 | Differential Fault Analysis of Streebog. Riham AlTawy, Amr M. Youssef |
| 2015 | Efficient File Sharing in Electronic Health Records. Clémentine Gritti, Willy Susilo, Thomas Plantard |
| 2015 | Estimating Differential-Linear Distinguishers and Applications to CTC2. Chun Guo, Hailong Zhang, Dongdai Lin |
| 2015 | Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement. Chenglong Wei, Wenchang Shi, Bo Qin, Bin Liang |
| 2015 | Fault Attacks on Stream Cipher Scream. Shaoyu Du, Bin Zhang, Zhenqi Li, Dongdai Lin |
| 2015 | Fully Secure Online/Offline Predicate and Attribute-Based Encryption. Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
| 2015 | Half a Century of Practice: Who Is Still Storing Plaintext Passwords? Erick Bauman, Yafeng Lu, Zhiqiang Lin |
| 2015 | Hard Invalidation of Electronic Signatures. Lucjan Hanzlik, Miroslaw Kutylowski, Moti Yung |
| 2015 | IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication. Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang |
| 2015 | Improved Differential Analysis of Block Cipher PRIDE. Qianqian Yang, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song, Jinyong Shan, Xiaoshuang Ma |
| 2015 | Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Proceedings Javier López, Yongdong Wu |
| 2015 | Lightweight Function Pointer Analysis. Wei Zhang, Yu Zhang |
| 2015 | Models of Curves from GHS Attack in Odd Characteristic. Song Tian, Wei Yu, Bao Li, Kunpeng Wang |
| 2015 | New Constructions of T-function. Dibyendu Roy, Ankita Chaturvedi, Sourav Mukhopadhyay |
| 2015 | New Related Key Attacks on the RAKAPOSHI Stream Cipher. Lin Ding, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Wei Zhao |
| 2015 | Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records. Yunya Zhou, Jianwei Liu, Hua Deng, Bo Qin, Lei Zhang |
| 2015 | On the Effectiveness of Different Botnet Detection Approaches. Fariba Haddadi, Duc Le Cong, Laura Porter, Nur Zincir-Heywood |
| 2015 | On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes. Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng |
| 2015 | One-Round Witness Indistinguishability from Indistinguishability Obfuscation. Qihua Niu, Hongda Li, Guifang Huang, Bei Liang, Fei Tang |
| 2015 | Operating System Security Policy Hardening via Capability Dependency Graphs. Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng |
| 2015 | Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption. Yutaka Kawai |
| 2015 | Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant. Liqiang Peng, Lei Hu, Zhangjie Huang, Jun Xu |
| 2015 | Revocable Threshold Attribute-Based Signature against Signing Key Exposure. Jianghong Wei, Xinyi Huang, Xuexian Hu, Wenfen Liu |
| 2015 | Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves. Song Tian, Wei Yu, Bao Li, Kunpeng Wang |
| 2015 | Strongly Secure Key Exchange Protocol with Minimal KEM. Baoping Tian, Fushan Wei, Chuangui Ma |
| 2015 | User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts. Michael Velten, Peter Schneider, Sascha Wessel, Claudia Eckert |
| 2015 | Visualizing Privacy Risks of Mobile Applications through a Privacy Meter. Jina Kang, Hyoungshick Kim, Yun-Gyung Cheong, Jun Ho Huh |
| 2015 | sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices. Shijun Zhao, Qianying Zhang |