| 2016 | A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing. Guanhua Yan, Yunus Kucuk, Max Slocum, David C. Last |
| 2016 | AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng |
| 2016 | Analyzing Randomized Response Mechanisms Under Differential Privacy. Atsushi Waseda, Ryo Nojima |
| 2016 | Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols. Franziskus Kiefer, Mark Manulis |
| 2016 | Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2. Lucjan Hanzlik, Miroslaw Kutylowski |
| 2016 | Control Flow Integrity Enforcement with Dynamic Code Optimization. Yan Lin, Xiaoxiao Tang, Debin Gao, Jianming Fu |
| 2016 | Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication. Jun Xu, Lei Hu, Xiaona Zhang, Liqiang Peng, Zhangjie Huang |
| 2016 | Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption. Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng |
| 2016 | Cyber Security Risk Assessment of a DDoS Attack. Gaute Wangen, Andrii Shalaginov, Christoffer Hallstensen |
| 2016 | Damaging, Simplifying, and Salvaging p-OMD. Tomer Ashur, Bart Mennink |
| 2016 | Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security. Junichi Tomida, Masayuki Abe, Tatsuaki Okamoto |
| 2016 | Enhanced Correlation Power Analysis by Biasing Power Traces. Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai, Na Pang |
| 2016 | Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method. Dongpeng Xu, Jiang Ming, Dinghao Wu |
| 2016 | Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures in the Non-programmable Random Oracle Model. Masayuki Fukumitsu, Shingo Hasegawa |
| 2016 | Improved Linear Cryptanalysis of Round-Reduced ARIA. Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef |
| 2016 | Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings Matt Bishop, Anderson C. A. Nascimento |
| 2016 | Leveraging Internet Services to Evade Censorship. Apostolis Zarras |
| 2016 | MQSAS - A Multivariate Sequential Aggregate Signature Scheme. Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt |
| 2016 | Models and Algorithms for Graph Watermarking. David Eppstein, Michael T. Goodrich, Jenny Lam, Nil Mamano, Michael Mitzenmacher, Manuel R. Torres |
| 2016 | Moving Target Defense Against Network Reconnaissance with Software Defined Networking. Li Wang, Dinghao Wu |
| 2016 | Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits. Atsushi Takayasu, Noboru Kunihiro |
| 2016 | Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems. Steffen Wagner, Claudia Eckert |
| 2016 | SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing. George D. Webster, Zachary D. Hanif, Andre L. P. Ludwig, Tamas K. Lengyel, Apostolis Zarras, Claudia Eckert |
| 2016 | Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128. Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef |
| 2016 | Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control. Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan |
| 2016 | Universally Composable Two-Server PAKE. Franziskus Kiefer, Mark Manulis |
| 2016 | Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools. Samiran Bag, Kouichi Sakurai |