| 2013 | (k - n) Oblivious Transfer Using Fully Homomorphic Encryption System. Mohammed Kaosar, Quazi Mamun, Md. Rafiqul Islam, Xun Yi |
| 2013 | A Novel Web Tunnel Detection Method Based on Protocol Behaviors. Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang |
| 2013 | An Efficient Reconfigurable II-ONB Modular Multiplier. Miao Li, Liangsheng He, Tongjie Yang, Neng Gao, Zongbin Liu, Qinglong Zhang |
| 2013 | An e-payment Architecture Ensuring a High Level of Privacy Protection. Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger |
| 2013 | Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks. Eirini D. Karapistoli, Anastasios A. Economides |
| 2013 | Automatic Polymorphic Exploit Generation for Software Vulnerabilities. Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng |
| 2013 | Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu |
| 2013 | CamTalk: A Bidirectional Light Communications Framework for Secure Communications on Smartphones. Mengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian |
| 2013 | Clonewise - Detecting Package-Level Clones Using Machine Learning. Silvio Cesare, Yang Xiang, Jun Zhang |
| 2013 | Contrasting Permission Patterns between Clean and Malicious Android Applications. Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Margaret Batten |
| 2013 | Detection of Android API Call Using Logging Mechanism within Android Framework. Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai |
| 2013 | Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation. Ryan Farley, Xinyuan Wang |
| 2013 | DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. Yousra Aafer, Wenliang Du, Heng Yin |
| 2013 | Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs. Quazi Mamun, Md. Rafiqul Islam, Mohammed Kaosar |
| 2013 | Generic Mediated Encryption. Ibrahim F. Elashry, Yi Mu, Willy Susilo |
| 2013 | Integrated Security Architecture for Virtual Machines. Vijay Varadharajan, Udaya Kiran Tupakula |
| 2013 | Public-Key Encryption Resilient to Linear Related-Key Attacks. Hui Cui, Yi Mu, Man Ho Au |
| 2013 | Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform. Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan |
| 2013 | Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege. Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens |
| 2013 | Scalable Security Model Generation and Analysis Using k-importance Measures. Jin B. Hong, Dong Seong Kim |
| 2013 | Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks. Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li |
| 2013 | Securing a Web-Based Anti-counterfeit RFID System. Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy |
| 2013 | Security Concerns and Remedy in a Cloud Based E-learning System. Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal H. Abawajy |
| 2013 | Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers Tanveer A. Zia, Albert Y. Zomaya, Vijay Varadharajan, Zhuoqing Morley Mao |
| 2013 | The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. Mehari Msgna, Konstantinos Markantonakis, Keith Mayes |
| 2013 | Unveiling Privacy Setting Breaches in Online Social Networks. Xin Ruan, Chuan Yue, Haining Wang |
| 2013 | VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing. Jun Jiang, Meining Nie, Purui Su, Dengguo Feng |