| 2017 | A Constant-Size Signature Scheme with Tighter Reduction from CDH Assumption. Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki |
| 2017 | A Differentially Private Encryption Scheme. Carlo Brunetta, Christos Dimitrakakis, Bei Liang, Aikaterini Mitrokotsa |
| 2017 | An Improved SAT-Based Guess-and-Determine Attack on the Alternating Step Generator. Oleg Zaikin, Stepan Kochemazov |
| 2017 | Automated Analysis of Accountability. Alessandro Bruni, Rosario Giustolisi, Carsten Schuermann |
| 2017 | Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU. Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi |
| 2017 | Contactless Access Control Based on Distance Bounding. Handan Kilinç, Serge Vaudenay |
| 2017 | Curtain: Keep Your Hosts Away from USB Attacks. Jianming Fu, Jianwei Huang, Lanxin Zhang |
| 2017 | Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts. Md. Shahrear Iqbal, Mohammad Zulkernine |
| 2017 | Efficient Masking of ARX-Based Block Ciphers Using Carry-Save Addition on Boolean Shares. Daniel Dinu, Johann Großschädl, Yann Le Corre |
| 2017 | Enforcing ACL Access Control on Android Platform. Xiaohai Cai, Xiaozhuo Gu, Yuewu Wang, Quan Zhou, Zhenhuan Cao |
| 2017 | Generic Forward-Secure Key Agreement Without Signatures. Cyprien de Saint Guilhem, Nigel P. Smart, Bogdan Warinschi |
| 2017 | Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks. Weizhi Meng, Fei Fei, Wenjuan Li, Man Ho Au |
| 2017 | Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms. Jérémy Chotard, Duong Hieu Phan, David Pointcheval |
| 2017 | How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack. Xueyi Yang, Limin Liu, Lingchen Zhang, Weiyu Jiang, Shiran Pan |
| 2017 | Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers. Li Lin, Wenling Wu, Yafei Zheng |
| 2017 | Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysis. Lam Tran, Thang Hoang, Thuc Dinh Nguyen, Deokjai Choi |
| 2017 | Improving Password Guessing Using Byte Pair Encoding. Xingxing Wang, Dakui Wang, Xiaojun Chen, Rui Xu, Jinqiao Shi, Li Guo |
| 2017 | Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings Phong Q. Nguyen, Jianying Zhou |
| 2017 | Low-Level Attacks in Bitcoin Wallets. Andriana Gkaniatsou, Myrto Arapinis, Aggelos Kiayias |
| 2017 | Nightingale: Translating Embedded VM Code in x86 Binary Executables. Haijiang Xie, Yuanyuan Zhang, Juanru Li, Dawu Gu |
| 2017 | Rate-One AE with Security Under RUP. Shoichi Hirose, Yu Sasaki, Kan Yasuda |
| 2017 | Run-Time Verification for Observational Determinism Using Dynamic Program Slicing. Mohammad Ghorbani, Mehran S. Fallah |
| 2017 | T-MAC: Protecting Mandatory Access Control System Integrity from Malicious Execution Environment on ARM-Based Mobile Devices. Diming Zhang, Liangqiang Chen, Fei Xue, Hao Wu, Hao Huang |
| 2017 | Visualization of Intrusion Detection Alarms Collected from Multiple Networks. Boyeon Song, Sang-Soo Choi, Jangwon Choi, Jungsuk Song |
| 2017 | Watermarking Public-Key Cryptographic Functionalities and Implementations. Foteini Baldimtsi, Aggelos Kiayias, Katerina Samari |
| 2017 | Zero-Knowledge Password Policy Check from Lattices. Khoa Nguyen, Benjamin Hong Meng Tan, Huaxiong Wang |