| 2016 | A Formal Concept of Domain Pseudonymous Signatures. Kamil Kluczniak, Lucjan Hanzlik, Miroslaw Kutylowski |
| 2016 | A Host-Based Detection Method of Remote Access Trojan in the Early Stage. Daichi Adachi, Kazumasa Omote |
| 2016 | A Privacy Preserving Source Verifiable Encryption Scheme. Zhongyuan Yao, Yi Mu, Guomin Yang |
| 2016 | A Spark-Based DDoS Attack Detection Model in Cloud Services. Jian Zhang, Yawei Zhang, Pin Liu, Jianbiao He |
| 2016 | ARMv8 Shellcodes from 'A' to 'Z'. Hadrien Barral, Houda Ferradi, Rémi Géraud, Georges-Axel Jaloyan, David Naccache |
| 2016 | Anonymizing Bitcoin Transaction. Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shifeng Sun, Xinyi Huang |
| 2016 | Authenticated CAN Communications Using Standardized Cryptographic Techniques. Zhuo Wei, Yanjiang Yang, Tieyan Li |
| 2016 | Collision Attacks on CAESAR Second-Round Candidate: ELmD. Jian Zhang, Wenling Wu, Yafei Zheng |
| 2016 | Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network. Adel D. Rajab, Chin-Tser Huang, Mohammed Al-Shargabi, Jorge Arturo Cobb |
| 2016 | Cryptanalysis of Midori128 Using Impossible Differential Techniques. Zhan Chen, Huaifeng Chen, Xiaoyun Wang |
| 2016 | Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013. Jingguo Bi, Jiayang Liu |
| 2016 | Efficient Tag Path Authentication Protocol with Less Tag Memory. HongBing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao |
| 2016 | Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU. Zhiniang Peng, Shaohua Tang, Ju Chen, Chen Wu, Xinglin Zhang |
| 2016 | Homomorphically Encrypted Arithmetic Operations Over the Integer Ring. Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng |
| 2016 | Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang |
| 2016 | KopperCoin - A Distributed File Storage with Financial Incentives. Henning Kopp, Christoph Bösch, Frank Kargl |
| 2016 | Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring. Hong Wei Siew, Saw Chin Tan, Ching Kwang Lee |
| 2016 | Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting. Guozhu Zhang, Luning Xia, Shijie Jia, Yafei Ji |
| 2016 | Practical Signature Scheme from \varGamma Γ -Protocol. Zhoujun Ma, Li Yang, Yunlei Zhao |
| 2016 | Privacy-Preserving Cloud Auditing with Multiple Uploaders. Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo |
| 2016 | Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree. Yaoan Jin, Chunhua Su, Na Ruan, Weijia Jia |
| 2016 | RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits. Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Piotr Syga |
| 2016 | Security of SM4 Against (Related-Key) Differential Cryptanalysis. Jian Zhang, Wenling Wu, Yafei Zheng |
| 2016 | Structural Evaluation for Simon-Like Designs Against Integral Attack. Huiling Zhang, Wenling Wu |
| 2016 | The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu |
| 2016 | Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography. Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache |