| 2013 | A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software. Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos |
| 2013 | A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy Preserving Distributed Data Mining. Nirali R. Nanavati, Devesh C. Jinwala |
| 2013 | A Key-revocable Attribute-based Encryption for Mobile Cloud Environments. Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake |
| 2013 | A Model-driven Approach for Securing Software Architectures. Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, Stefano Paraboschi |
| 2013 | A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities. Maider Huarte, Iñaki Goirizelaia, Juan José Unzilla, Jon Matías, Juan J. Igarza |
| 2013 | A Preliminary Application of Generalized Fault Trees to Security. Daniele Codetta Raiteri |
| 2013 | A Security-enhanced Design Methodology for Embedded Systems. Alberto Ferrante, Jelena Milosevic, Marija Janjusevic |
| 2013 | AVON - A Fast Hash Function for Intel SIMD Architectures. Matt Henricksen, Shinsaku Kiyomoto |
| 2013 | Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks. Slim Trabelsi, Hana Bouafif |
| 2013 | Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing. Ravi Jhawar, Vincenzo Piuri |
| 2013 | An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang |
| 2013 | An Efficient and Provably Secure Certificateless Identification Scheme. Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng |
| 2013 | Approaching Encryption through Complex Number Logarithms. George Stergiopoulos, Miltiadis Kandias, Dimitris Gritzalis |
| 2013 | Are Biometric Web Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks. Dustin van der Haar, Basie von Solms |
| 2013 | Behavior-based Malware Analysis using Profile Hidden Markov Models. Saradha Ravi, N. Balakrishnan, Bharath Venkatesh |
| 2013 | Database Anomalous Activities - Detection and Quantification. Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone |
| 2013 | Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs. Jonny Milliken, Valerio Selis, Kian Meng Yap, Alan Marshall |
| 2013 | Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication. Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz |
| 2013 | Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre |
| 2013 | Dynamic Proofs of Retrievability from Chameleon-Hashes. Stefan Rass |
| 2013 | E3SN - Efficient Security Scheme for Sensor Networks. Hassan Noura, Steven Martin, Khaldoun Al Agha |
| 2013 | Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications. Vinay S. Iyengar |
| 2013 | Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration. Lukas Malina, Jan Hajny, Zdenek Martinasek |
| 2013 | Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves. Christian Hanser, Daniel Slamanig |
| 2013 | Enhanced Truncated Differential Cryptanalysis of GOST. Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal |
| 2013 | Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control. Bo Lang, Runhua Xu, Yawei Duan |
| 2013 | From a Logical Approach to Internal States of Hash Functions - How SAT Problem Can Help to Understand SHA-* and MD*. Florian Legendre, Gilles Dequen, Michaël Krajecki |
| 2013 | HoneydV6: A Low-interaction IPv6 Honeypot. Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler, Eldad Zack |
| 2013 | Identity Security in Biometric Systems based on Keystroking. Lucjan Hanzlik, Wojciech Wodo |
| 2013 | Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting. Clémentine Maurice, Stéphane Onno, Christoph Neumann, Olivier Heen, Aurélien Francillon |
| 2013 | Improving Block Cipher Design by Rearranging Internal Operations. Liran Lerman, Jorge Nakahara Jr., Nikita Veshchikov |
| 2013 | InCC: Hiding Information by Mimicking Traffic In Network Flows. Luis Campo-Giralte, Cristina Conde, Isaac Martín de Diego, Enrique Cabello |
| 2013 | Instance-based Anomaly Method for Android Malware Detection. Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, Pablo García Bringas |
| 2013 | Intent Security Testing - An Approach to Testing the Intent-based Vulnerability of Android Components. Sébastien Salva, Stassia R. Zafimiharisoa, Patrice Laurençot |
| 2013 | Keystroke Authentication with a Capacitive Display using Different Mobile Devices. Matthias Trojahn, Christian Schadewald, Frank Ortmeier |
| 2013 | LMM - A Common Component for Software License Management on Cloud. Shinsaku Kiyomoto, Andre Rein, Yuto Nakano, Carsten Rudolph, Yutaka Miyake |
| 2013 | MINHO - A Novel Authentication Scheme based on Pre-Authentication Service. Hasan Kadhem |
| 2013 | Massive Group Message Authentication with Revocable Anonymity. Boaz Catane, Amir Herzberg |
| 2013 | Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta |
| 2013 | Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks. Ester Ciancamerla, Michele Minichino, S. Palmieri |
| 2013 | Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis. Daniel Santana de Freitas, Jorge Nakahara Jr. |
| 2013 | Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs. Z. Cliffe Schreuders, Adil M. Bhat |
| 2013 | On the Connection between t-Closeness and Differential Privacy for Data Releases. Josep Domingo-Ferrer |
| 2013 | On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices. Golam Sarwar, Olivier Mehani, Roksana Boreli, Mohamed Ali Kâafar |
| 2013 | On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers. Ruth Ng Ii-Yung, Khoongming Khoo, Raphael C.-W. Phan |
| 2013 | Partially Wildcarded Attribute-based Encryption and Its Efficient Construction. Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai |
| 2013 | Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE. Michael Clear, Ciaran McGoldrick |
| 2013 | Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones. Thomas Zefferer, Peter Teufl |
| 2013 | Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles. Kazuki Yoneyama |
| 2013 | Preimage Attack on BioHashing. Patrick Lacharme, Estelle Cherrier, Christophe Rosenberger |
| 2013 | Privacy-enhanced Perceptual Hashing of Audio Data. Heiko Knospe |
| 2013 | Privacy-preserving Realization of the STORK Framework in the Public Cloud. Bernd Zwattendorfer, Daniel Slamanig |
| 2013 | Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks. Jan Hajny, Lukas Malina, Zdenek Martinasek, Vaclav Zeman |
| 2013 | Public-key Cryptography from Different Assumptions - A Multi-bit Version. Hervé Chabanne, Gérard D. Cohen, Alain Patey |
| 2013 | Recovering RSA Private Keys on Implementations with Tampered LSBs. Constantinos Patsakis |
| 2013 | Redactable Signature Scheme for Tree-structured Data based on Merkle Tree. Shoichi Hirose, Hidenori Kuwakado |
| 2013 | Related-key Impossible Differential Cryptanalysis of Full-round HIGHT. Saeed Rostami, Sadegh Bamohabbat Chafjiri, Seyed Amir Hossein Tabatabaei |
| 2013 | SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013 Pierangela Samarati |
| 2013 | SVD-based Digital Image Watermarking on approximated Orthogonal Matrix. Yevhen Zolotavkin, Martti Juhola |
| 2013 | Secure Alert Tracking in Supply Chain. Mehdi Khalfaoui, Refik Molva, Laurent Gomez |
| 2013 | Secure Computation of Hidden Markov Models. Mehrdad Aliasgari, Marina Blanton |
| 2013 | Secure Second Price Auctions with a Rational Auctioneer. Boaz Catane, Amir Herzberg |
| 2013 | Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data. Simone Bongiovanni, Giuseppe Scotti, Alessandro Trifiletti |
| 2013 | Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks. Mickaël Cazorla, Kevin Marquet, Marine Minier |
| 2013 | Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs. Rolf Haynberg, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade |
| 2013 | The Usability of CAPTCHAs on Smartphones. Gerardo Reynaga, Sonia Chiasson |
| 2013 | Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme. Jacques M. Bahi, Nicolas Friot, Christophe Guyeux |
| 2013 | Towards Cryptographic Function Distinguishers with Evolutionary Circuits. Petr Svenda, Martin Ukrop, Vashek Matyas |
| 2013 | Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control. Lan Zhou, Vijay Varadharajan, Michael Hitchens |
| 2013 | Which Side Are You On? - A New Panopticon vs. Privacy. Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis |
| 2013 | iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments. Peter Teufl, Thomas Zefferer, Christof Stromberger, Christoph Hechenblaikner |