| 2014 | A Dynamic Matching Secret Handshake Scheme without Random Oracles. Yamin Wen, Zheng Gong |
| 2014 | A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service. Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu |
| 2014 | A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing. Zhenhua Chen, Shundong Li, Yimin Guo, Yilei Wang, Yunjie Chu |
| 2014 | A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique. Yonglin Hao, Dongxia Bai, Leibo Li |
| 2014 | A New Approach to Executable File Fragment Detection in Network Forensics. Khoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma |
| 2014 | A New Multivariate Based Threshold Ring Signature Scheme. Jingwan Zhang, Yiming Zhao |
| 2014 | A New Public Key Encryption with Equality Test. Kaibin Huang, Raylin Tso, Yu-Chi Chen, Wangyu Li, Hung-Min Sun |
| 2014 | A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks. Mengmeng Ge, Kim-Kwang Raymond Choo |
| 2014 | A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers. Pratish Datta, Dibyendu Roy, Sourav Mukhopadhyay |
| 2014 | A Proposed Approach to Compound File Fragment Identification. Khoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma |
| 2014 | A Secure Obfuscator for Encrypted Blind Signature Functionality. Xiao Feng, Zheng Yuan |
| 2014 | A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique. Yumei Li, Holger Voos, Albert Rosich, Mohamed Darouach |
| 2014 | Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. Dang Nguyen, Jaehong Park, Ravi S. Sandhu |
| 2014 | An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructures. Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette |
| 2014 | Attribute-Based Signing Right Delegation. Weiwei Liu, Yi Mu, Guomin Yang |
| 2014 | Capturing Android Malware Behaviour Using System Flow Graph. Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong |
| 2014 | Certificate-Based Conditional Proxy Re-Encryption. Jiguo Li, Xuexia Zhao, Yichen Zhang |
| 2014 | Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios. Sriramkrishnan Srinivasan, Chris Culnane, James Heather, Steve A. Schneider, Zhe Xia |
| 2014 | Cryptanalysis on the Authenticated Cipher Sablier. Xiutao Feng, Fan Zhang |
| 2014 | Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks. Bo Qin, Linxiao Wang, Yujue Wang, Qianhong Wu, Wenchang Shi, Bin Liang |
| 2014 | Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD. Miao Xie, Jiankun Hu, Xinghuo Yu, Elizabeth Chang |
| 2014 | Exploiting the Hard-Wired Vulnerabilities of Newscast via Connectivity-Splitting Attack. Jakub Muszynski, Sébastien Varrette, Juan Luis Jiménez Laredo, Pascal Bouvry |
| 2014 | Extending OpenStack Access Control with Domain Trust. Bo Tang, Ravi S. Sandhu |
| 2014 | Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features. Wei Zhou, Jiankun Hu, Song Wang, Ian R. Petersen, Mohammed Bennamoun |
| 2014 | Formal Analysis of DAA-Related APIs in TPM 2.0. Li Xi, Dengguo Feng |
| 2014 | Formal Verification of Finite State Transactional Security Policy. N. Rajamanickam, R. Nadarajan, Atilla Elçi |
| 2014 | GO-ABE: Group-Oriented Attribute-Based Encryption. Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu |
| 2014 | Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework. Nathalie Baracaldo, Balaji Palanisamy, James B. D. Joshi |
| 2014 | Hierarchical Solution for Access Control and Authentication in Software Defined Networks. Shuangyu He, Jianwei Liu, Jian Mao, Jie Chen |
| 2014 | How to Evaluate Trust Using MMT. Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli |
| 2014 | Identity Based Threshold Ring Signature from Lattices. Baodian Wei, Yusong Du, Huang Zhang, Fangguo Zhang, Haibo Tian, Chong-zhi Gao |
| 2014 | Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage. Yong Yu, Yi Mu, Jianbing Ni, Jiang Deng, Ke Huang |
| 2014 | Identity-Based Transitive Signcryption. Shuquan Hou, Xinyi Huang, Li Xu |
| 2014 | Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock. Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su |
| 2014 | Jhanwar-Barua's Identity-Based Encryption Revisited. Ibrahim F. Elashry, Yi Mu, Willy Susilo |
| 2014 | Lightweight Universally Composable Adaptive Oblivious Transfer. Vandana Guleria, Ratna Dutta |
| 2014 | Multi-domain Direct Anonymous Attestation Scheme from Pairings. Li Yang, Jianfeng Ma, Wei Wang, Chunjie Cao |
| 2014 | Network and System Security - 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings Man Ho Au, Barbara Carminati, C.-C. Jay Kuo |
| 2014 | On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification. Di Wu, Xiao Chen, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou |
| 2014 | Privacy Preserving Biometrics-Based and User Centric Authentication Protocol. Hasini Gunasinghe, Elisa Bertino |
| 2014 | Rational Secure Two-party Computation in Social Cloud. Yilei Wang, Zhe Liu, Tao Li, Qiuliang Xu |
| 2014 | Revisiting Node Injection of P2P Botnet. Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong, Dengguo Feng |
| 2014 | Security Analysis and Improvement of Femtocell Access Control. Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Mu-En Wu |
| 2014 | Tighter Security Bound of MIBS Block Cipher against Differential Attack. Xiaoshuang Ma, Lei Hu, Siwei Sun, Kexin Qiao, Jinyong Shan |
| 2014 | Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS. Shijun Zhao, Qianying Zhang, Yu Qin, Dengguo Feng |
| 2014 | eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy. Tapas Pandit, Rana Barua, Somanath Tripathy |
| 2014 | iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications. Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu |
| 2014 | psOBJ: Defending against Traffic Analysis with pseudo-Objects. Yi Tang, Piaoping Lin, Zhaokai Luo |