Accepted Papers

Secure and Verifiable Outsourcing of Sequence Comparisons
Yansheng Feng, Xiaofeng Chen, Hua Ma

Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services:
A Case Study on Twitter
Dongjin Choi, Pankoo Kim

On the efficiency modelling of cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML)
Bogdan Ksiezopolski, Damian Rusinek, and Adam Wierzbicki

DiffSig: Resource Differentiation based Malware Behavioral Concise Signature Generation
Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su

On Identifying Proper Security Mechanisms
Jakub Breier, Ladislav Hudec

A Recovery Approach for SQLite History Recorders from YAFFS2
Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng

UVHM: Model Checking based Formal Analysis Scheme for Hypervisors
Yuchao She, Hui Li, Hui Zhu

SA4WSs: a Security Architecture for Web Services
Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation
Shuhui Hou, Ryoichi Sasaki, Tetsutaro Uehara, Siuming Yiu

A Test Case Generation Technique for VMM Fuzzing
Xiaoxia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang

A Variant of Non-Adaptive Group Testing and its Application in Pay-Television via Internet
Thach V. Bui, Thuc D. Nguyen

A Proposal on Security Case based on Common Criteria
Shuichiro Yamamoto, Tomoko Kaneko, Hidehiko Tanaka

An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-core Processors
Wentao Jia, Rui Li, Chunyuan Zhang

Identity Management Lifecycle – Exemplifying the Need for Holistic Identity Assurance Frameworks
Jostein Jensen

Anonymous Lattice-Based Broadcast Encryption
Adela Georgescu

Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance
Amril Syalim, Takashi Nishide, Kouichi Sakurai

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation
Xingxing Xie, Xiaofeng Chen, Hua Ma, Jin Li,     

Provably Secure and Subliminal-Free Variant of Schnorr Signature
Yinghui Zhang, Hui Li,

A Block Cipher Mode of Operation with Two Keys
Yi-Li Huang, Fang-Yie Leu, Jing-Hao Yang
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
Ruxandra F. Olimid

Modified Efficient & Secure Dynamic ID-based User Authentication Scheme
Toan Thinh Truong, Minh Triet Tran, Anh Duc Duong

A Simplified Privacy Preserving Message Delivery Protocol in VDTNs
Youngho Park, Chul Sur, Kyung-Hyune Rhee

Confidentiality-Preserving Query Execution of Fragmented Outsourced Data
Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez

Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control
Nisreen Alam Aldeen, Gerald Quirchmayr

Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol
Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani

A Real-time Privacy Amplification Scheme in Quantum Key Distribution
Bo Liu, Bo Liu, Baokang Zhao, Dingjie Zou, Chunqing Wu, Ilsun You

CSP-based General Detection Model of Network Covert Storage Channels
Hui Zhu, Tingting Liu, Guanghui Wei, Beishui Liu, Hui Li,

Trustworthy Opportunistic Access to the Internet of Services
Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You

Architecture of Network Environment for High-risk Security Experimentation
Xiaohui Kuang, Xiang Li

Emulation on the Internet Prefix Hijacking Attack Impaction
Jinjing Zhao, Yan Wen

Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction
Lu Zhao, Ho-Seok Kang , Sung-Ryul Kim

Unconditionally Secure Fully Connected Key Establishment using Deployment Knowledge
Sarbari Mitra, Sourav Mukhopadhyay, Ratna Dutta    

Improved Greedy Forwarding Protocol for VANETs
Wen Huaqing and Rhee Kyung-Hyune  

A Review of Security Attacks on the GSM Standard
Umberto Ferraro Petrillo, Giancarlo De Maio, Giuseppe Cattaneo, Pompeo Faruolo,

An Extended Multi-Secret Images Sharing Scheme Based on Boolean Operation
Huan Wang, MingXing He, Xiao Li

Image Watermarking Using Psychovisual Threshold Over the Edge
Nur Azman Abu, Ferda Ernawan, Nanna Suryana, Shahrin Sahib

A Data Structure for Efficient Biometric Identification
Kensuke Baba, Serina Egawa

The PCA-Based Long Distance Face Recognition using Multiple Distance Training Images for Intelligent Surveillance System
Hae-Min Moon, Sung Bum Pan