| 2015 | Information Security, 16th International Conference, ISC 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings Yvo Desmedt |
| 2013 | 4GMOP: Mopping Malware Initiated SMS Traffic in Mobile Networks. Marián Kühnel, Ulrike Meyer |
| 2013 | A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites. Ping Chen, Nick Nikiforakis, Christophe Huygens, Lieven Desmet |
| 2013 | A Secure and Efficient Method for Scalar Multiplication on Supersingular Elliptic Curves over Binary Fields. Matheus F. de Oliveira, Marco Aurélio Amaral Henriques |
| 2013 | Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data. Yanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan, Jianying Zhou |
| 2013 | An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles. Naoto Yanai, Masahiro Mambo, Eiji Okamoto |
| 2013 | Cars, Condoms, and Facebook. Vaibhav Garg, L. Jean Camp |
| 2013 | CrowdFlow: Efficient Information Flow Security. Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz |
| 2013 | Design and Analysis of a Sophisticated Malware Attack Against Smart Grid. Byungho Min, Vijay Varadharajan |
| 2013 | DroidTest: Testing Android Applications for Leakage of Private Information. Sarker T. Ahmed Rumee, Donggang Liu |
| 2013 | Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption. Takashi Kitagawa, Hiroki Kojima, Nuttapong Attrapadung, Hideki Imai |
| 2013 | Encrypted Secret Sharing and Analysis by Plaintext Randomization. Stephen R. Tate, Roopa Vishwanathan, Scott Weeks |
| 2013 | Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited. Lin Jiao, Bin Zhang, Mingsheng Wang |
| 2013 | Factoring a Multiprime Modulus Routo Terada, Reynaldo Cáceres Villena |
| 2013 | Faster 128-EEA3 and 128-EIA3 Software. Roberto Avanzi, Billy Bob Brumley |
| 2013 | Fine-Grained Access Control for HTML5-Based Mobile Applications in Android. Xing Jin, Lusha Wang, Tongbo Luo, Wenliang Du |
| 2013 | Human Assisted Randomness Generation Using Video Games. Mohsen Alimomeni, Reihaneh Safavi-Naini |
| 2013 | Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA. Dongxia Bai, Hongbo Yu |
| 2013 | Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection. Irfan Ahmed, Golden G. Richard III, Aleksandar Zoranic, Vassil Roussev |
| 2013 | Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks. Steffen Wagner, Christoph Krauß, Claudia Eckert |
| 2013 | Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases. Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores |
| 2013 | Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. Cristina Alcaraz, Estefanía Etchevés Miciolino, Stephen D. Wolthusen |
| 2013 | Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards. Ding Wang, Ping Wang |
| 2013 | On the Viability of CAPTCHAs for use in Telephony Systems: A Usability Field Study. Niharika Sachdeva, Nitesh Saxena, Ponnurangam Kumaraguru |
| 2013 | Practical and Provably Secure Distance-Bounding. Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay |
| 2013 | Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length. Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro |
| 2013 | Round-Efficient Private Stable Matching from Additive Homomorphic Encryption. Tadanori Teruya, Jun Sakuma |
| 2013 | Security Ranking Among Assumptions Within the Antoine Joux, Antoine Rojat |
| 2013 | Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices. Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng, Jianying Zhou |
| 2013 | The Security Defect of a Multi-pixel Encoding Method. Teng Guo, Feng Liu, Chuan Kun Wu, YoungChang Hou, YaWei Ren, Wen Wang |