33 Eirini Karapistoli and Anastasios Economides. Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks
29 Hui Cui, Yi Mu and Man Ho Au. Public-Key Encryption Resilient to Linear Related-Key Attacks
43 Shenglong Ding and Yiming Zhao. Efficient Undeniable Attribute-Based Signature
48 Xin Ruan, Chuan Yue and Haining Wang. Unveiling Privacy Setting Breaches in Online Social Networks
17 Li Miao, He Liangsheng, Gao Neng, Yang Tongjie and Liu Zongbin. An Efficient Reconfigurable II-ONB Modular Multiplier
22 Ibrahim Elashry, Yi Mu and Willy Susilo. Generic Mediated Encryption
68 Ryan Farley and Xinyuan Wang. Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation
67 Mengjun Xie, Liang Hao, Kenji Yoshigoe and Jiang Bian. CamTalk: A Bidirectional Light Communications Framework for Secure Communications On Smartphones
15 Jun Jiang, Meining Nie, Purui Su and Dengguo Feng. VCCBox: Practical Confinement of Untrusted Applications in Virtual Cloud Computing
27 Niels Avonds, Raoul Strackx, Pieter Agten and Frank Piessens. Salus: Non-Hierarchical Memory Access Rights to Enforce the Principle of Least Privilege
46 Cui Xiang, Fang Binxing, Shi Jinqiao and Liu Chaoge. Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets
19 Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty and Christophe Rosenberger. An e-payment architecture ensuring a high level of privacy protection
45 Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li and Lynn Batten. Contrasting Permission Patterns between Clean and Malicious Android Application
25 Silvio Cesare, Yang Xiang and Jun Zhang. Clonewise – Detecting Package-level Clones Using Machine Learning
28 Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang and Dengguo Feng. Automatic Polymorphic Exploit Generation for Software Vulnerabilities
49 Yousra Aafer, Wenliang Du and Heng Yin. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android
59 Ting Zhou, Yaping Lin, Wei Zhang, Sheng Xiao and Jinguo Li. Secure and Verifiable Top-k Query in Two-tiered Sensor Networks
61 Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao and Wei Yang. A Novel Web Tunnel Detection Method Based on Protocol Behaviors
64 Jin B. Hong and Dong Seong Kim. Scalable Security Model Generation and Analysis using k-importance Measures
23 Mehari Msgna, Konstantinos Markantonakis and Keith Mayes. The B-Side of Side Channel Leakage: Control Flow Security In Embedded Systems
69 Udaya Tupakula and Vijay Varadharajan. Integrated Security Architecture for Virtual Machines