| 2013 | A Comprehensive Access Control System for Scientific Applications. Muhammad I. Sarfraz, Peter Baker, Jia Xu, Elisa Bertino |
| 2013 | A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks. Jia Hu, Hui Lin, Li Xu |
| 2013 | A Finger-Vein Based Cancellable Bio-cryptosystem. Wencheng Yang, Jiankun Hu, Song Wang |
| 2013 | A Formally Verified Initial Authentication and Key Agreement Protocol in Heterogeneous Environments Using Casper/FDR. Mahdi Aiash |
| 2013 | A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation. Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie |
| 2013 | A New Unpredictability-Based RFID Privacy Model. Anjia Yang, Yunhui Zhuang, Duncan S. Wong, Guomin Yang |
| 2013 | A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture. Mahdi Aiash |
| 2013 | A Pairing-Free Identity Based Authentication Framework for Cloud Computing. Dheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay |
| 2013 | A Technology Independent Security Gateway for Real-Time Multimedia Communication. Fudong Li, Nathan L. Clarke, Steven Furnell |
| 2013 | An Efficient Constant Round ID-Based Group Key Agreement Protocol for Ad Hoc Networks. Elisavet Konstantinou |
| 2013 | Ancestor Excludable Hierarchical ID-Based Encryption Revisited. Fan Zhang, Hua Guo, Zhoujun Li |
| 2013 | Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines. Suaad S. Alarifi, Stephen D. Wolthusen |
| 2013 | Architecture for Trapping Toll Fraud Attacks Using a VoIP Honeynet Approach. Markus Gruber, Christian Schanes, Florian Fankhauser, Martin Moutran, Thomas Grechenig |
| 2013 | Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards. Shaohua Tang, Lingling Xu |
| 2013 | Building Better Unsupervised Anomaly Detector with S-Transform. Sirikarn Pukkawanna, Hiroaki Hazeyama, Youki Kadobayashi, Suguru Yamaguchi |
| 2013 | Collusion-Resistant Domain-Specific Pseudonymous Signatures. Julien Bringer, Hervé Chabanne, Alain Patey |
| 2013 | Combining Dynamic Passive Analysis and Active Fingerprinting for Effective Bot Malware Detection in Virtualized Environments. Shun-Wen Hsiao, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen |
| 2013 | Distributed and Anonymous Publish-Subscribe. Jörg Daubert, Mathias Fischer, Stefan Schiffner, Max Mühlhäuser |
| 2013 | Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network. Y. Sreenivasa Rao, Ratna Dutta |
| 2013 | Efficient and Private Three-Party Publish/Subscribe. Giovanni Di Crescenzo, Jim Burns, Brian A. Coan, John L. Schultz, Jonathan Robert Stanton, Simon Tsang, Rebecca N. Wright |
| 2013 | Enhancing Passive Side-Channel Attack Resilience through Schedulability Analysis of Data-Dependency Graphs. Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale |
| 2013 | Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection. Yuxin Meng, Wenjuan Li, Lam-for Kwok |
| 2013 | Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method. Yao Lu, Rui Zhang, Dongdai Lin |
| 2013 | Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs. Jing Chen, Ruiying Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang |
| 2013 | Filtering Trolling Comments through Collective Classification. Jorge de-la-Peña-Sordo, Igor Santos, Iker Pastor-López, Pablo García Bringas |
| 2013 | Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols. Alessandro Armando, Roberto Carbone, Luca Zanetti |
| 2013 | Forward Secure Certificateless Proxy Signature Scheme. Jiguo Li, Yanqiong Li, Yichen Zhang |
| 2013 | Human Identification with Electroencephalogram (EEG) for the Future Network Security. Xu Huang, Salahiddin Altahat, Dat Tran, Shutao Li |
| 2013 | Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network. Chao Wang, Kefei Mao, Jianwei Liu, Jianhua Liu |
| 2013 | Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. Sashi Gurung, Dan Lin, Anna Cinzia Squicciarini, Elisa Bertino |
| 2013 | Insiders Trapped in the Mirror Reveal Themselves in Social Media. Miltiadis Kandias, Konstantina Galbogini, Lilian Mitrou, Dimitris Gritzalis |
| 2013 | JShadObf: A JavaScript Obfuscator Based on Multi-Objective Optimization Algorithms. Benoît Bertholon, Sébastien Varrette, Pascal Bouvry |
| 2013 | Leakage-Resilient Zero-Knowledge Proofs of Knowledge for NP. Hongda Li, Qihua Niu, Bei Liang |
| 2013 | Leveraging String Kernels for Malware Detection. Jonas Pfoh, Christian A. Schneider, Claudia Eckert |
| 2013 | Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach. Maurizio Naldi, Marta Flamini, Giuseppe D'Acquisto |
| 2013 | Light Weight Network Coding Based Key Distribution Scheme for MANETs. Jianwei Liu, Abdur Rashid Sangi, Ruiying Du, Qianhong Wu |
| 2013 | MADS: Malicious Android Applications Detection through String Analysis. Borja Sanz, Igor Santos, Javier Nieves, Carlos Laorden, Iñigo Alonso-Gonzalez, Pablo García Bringas |
| 2013 | Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks. Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino |
| 2013 | Measuring and Comparing the Protection Quality in Different Operating Systems. Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng |
| 2013 | Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform. Wei Feng, Yu Qin, Dengguo Feng, Ge Wei, Lihui Xue, Dexian Chang |
| 2013 | Model the Influence of Sybil Nodes in P2P Botnets. Tianzuo Wang, Huaimin Wang, Bo Liu, Peichang Shi |
| 2013 | Modeling and Analysis for Thwarting Worm Propagation in Email Networks. Sheng Wen, Yang Xiang, Wanlei Zhou |
| 2013 | Network and System Security - 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings Javier López, Xinyi Huang, Ravi S. Sandhu |
| 2013 | Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding. Gabriel Cartier, Jean-François Cartier, José M. Fernandez |
| 2013 | On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework. George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis |
| 2013 | On Secure and Power-Efficient RFID-Based Wireless Body Area Network. Sana Ullah, Waleed Alsalih |
| 2013 | On the Applicability of Time-Driven Cache Attacks on Mobile Devices. Raphael Spreitzer, Thomas Plos |
| 2013 | On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems. Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador |
| 2013 | On the Security of an Efficient Attribute-Based Signature. Yan Zhang, Dengguo Feng, Zhengfeng Zhang, Liwu Zhang |
| 2013 | On the Use of Key Assignment Schemes in Authentication Protocols. James Alderman, Jason Crampton |
| 2013 | Partial Fingerprint Reconstruction with Improved Smooth Extension. Wei Zhou, Jiankun Hu, Ian R. Petersen, Mohammed Bennamoun |
| 2013 | Performance Prediction Model for Block Ciphers on GPU Architectures. Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa |
| 2013 | Privacy Preserving Context Aware Publish Subscribe Systems. Mohamed Nabeel, Stefan Appel, Elisa Bertino, Alejandro P. Buchmann |
| 2013 | Privacy-Preserving Multi-party Reconciliation Using Fully Homomorphic Encryption. Florian Weingarten, Georg Neugebauer, Ulrike Meyer, Susanne Wetzel |
| 2013 | Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting. Weijia Wang, Lei Hu, Yong Li |
| 2013 | Secure Storage and Fuzzy Query over Encrypted Databases. Zheli Liu, Haoyu Ma, Jin Li, Chunfu Jia, Jingwei Li, Ke Yuan |
| 2013 | Security Analysis of Touch Inputted Passwords - A Preliminary Study Based on the Resistance against Brute Force Attacks. Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto |
| 2013 | Security Authentication of AODV Protocols in MANETs. Ahmad Alomari |
| 2013 | Static Analysis for Regular Expression Denial-of-Service Attacks. James Kirrage, Asiri Rathnayake, Hayo Thielecke |
| 2013 | Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study. Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro García-Teodoro |
| 2013 | The OffPAD: Requirements and Usage. Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang, Johann Vincent, Laurent Miralabé |
| 2013 | Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks. Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng |
| 2013 | Threshold-Oriented Optimistic Fair Exchange. Yang Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo |
| 2013 | Towards Authenticated Objects. Daniele Midi, Ashish Kundu, Elisa Bertino |
| 2013 | Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning. Tamas K. Lengyel, Justin Neumann, Steve Maresca, Aggelos Kiayias |
| 2013 | Towards a More Secure Apache Hadoop HDFS Infrastructure - Anatomy of a Targeted Advanced Persistent Threat against HDFS and Analysis of Trusted Computing Based Countermeasures. Jason Cohen, Subatra Acharya |
| 2013 | Towards a Privacy-Preserving Solution for OSNs. Qiang Tang |
| 2013 | Tracing Sources of Anonymous Slow Suspicious Activities. Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James |
| 2013 | Using Trusted Platform Modules for Location Assurance in Cloud Networking. Christoph Krauß, Volker Fusenig |
| 2013 | Using the Smart Card Web Server in Secure Branchless Banking. Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis |
| 2013 | Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens. Kannan Karthik |
| 2013 | X-TIER: Kernel Module Injection. Sebastian Vogl, Fatih Kiliç, Christian A. Schneider, Claudia Eckert |