| 2016 | A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism. Jia-Ning Luo, Ming-Hour Yang, Cho-Luen Tsai |
| 2016 | A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers. Min Hsuan Cheng, Reza Sedaghat, Prathap Siddavaatam |
| 2016 | A New Transitive Signature Scheme. Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo |
| 2016 | A System of Shareable Keyword Search on Encrypted Data. Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun |
| 2016 | An Attribute-Based Protection Model for JSON Documents. Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan |
| 2016 | An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords. Tingting Wang, Man Ho Au, Wei Wu |
| 2016 | An Energy-Efficient Task Scheduling Heuristic Algorithm Without Virtual Machine Migration in Real-Time Cloud Environments. Yi Zhang, Liuhua Chen, Haiying Shen, Xiaohui Cheng |
| 2016 | An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms. Shashank Gupta, Brij Bhooshan Gupta |
| 2016 | DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern. Qiumao Ma, Wensheng Zhang, Jinsheng Zhang |
| 2016 | Detecting Malicious URLs Using Lexical Analysis. Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani |
| 2016 | Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing. Kai He, Jian Weng, Joseph K. Liu, Wanlei Zhou, Jia-Nan Liu |
| 2016 | Evading System-Calls Based Intrusion Detection Systems. Ishai Rosenberg, Ehud Gudes |
| 2016 | Expressive Rating Scheme by Signatures with Predications on Ratees. Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai |
| 2016 | Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. Qianqian Yang, Lei Hu, Siwei Sun, Ling Song |
| 2016 | Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining. Anisur Rahman, Yue Xu, Kenneth Radke, Ernest Foo |
| 2016 | Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo. Bailin Xie, Yu Wang, Chao Chen, Yang Xiang |
| 2016 | HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks. Toshihiro Yamauchi, Yuta Ikegami |
| 2016 | Improved Security Proof for Modular Exponentiation Bits. Kewei Lv, Wenjie Qin, Ke Wang |
| 2016 | Iris Cancellable Template Generation Based on Indexing-First-One Hashing. Yen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai, Wun-She Yap |
| 2016 | Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security. Jinshuo Liu, Yabo Xu, Juan Deng, Lina Wang, Lanxin Zhang |
| 2016 | MD- Gang Sheng, Chunming Tang, Wei Gao, Ying Yin |
| 2016 | Multi-device Anonymous Authentication. Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski |
| 2016 | Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. Chang-Shiun Liu, Li Xu, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun |
| 2016 | Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung |
| 2016 | On the Relationship Between Finite Domain ABAM and PreUCON \mathrm _A A. Asma Alshehri, Ravi S. Sandhu |
| 2016 | PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks. Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace Ho-Shing Ip |
| 2016 | Privacy Preserving Credit Systems. Sherman S. M. Chow, Russell W. F. Lai, Xiuhua Wang, Yongjun Zhao |
| 2016 | Privacy-Preserving Profile Matching Protocol Considering Conditions. Yosuke Ishikuro, Kazumasa Omote |
| 2016 | Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade. Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Stefanos Gritzalis |
| 2016 | Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards. Fangming Zhao, Takashi Nishide |
| 2016 | Secure Outsourced Bilinear Pairings Computation for Mobile Devices. Tomasz Hyla, Jerzy Pejas |
| 2016 | The Design and Implementation of Multi-dimensional Bloom Filter Storage Matrix. Fei Xu, Pinxin Liu, Jianfeng Yang, Jing Xu |
| 2016 | The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute Assignment. Maanak Gupta, Ravi S. Sandhu |
| 2016 | Timestamp Analysis for Quality Validation of Network Forensic Data. Nikolai Hampton, Zubair A. Baig |
| 2016 | Two-in-One Oblivious Signatures Secure in the Random Oracle Model. Raylin Tso |
| 2016 | While Mobile Encounters with Clouds. Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu |