ISC 2013 Accepted Regular Papers

Niharika Sachdeva, Nitesh Saxena and Ponnurangam Kumaraguru:
On the Viability of CAPTCHAs for Use in Telephony Systems: A Usability Field Study
Stephen Tate, Roopa Vishwanathan and Scott Weeks:
Encrypted Secret Sharing and Analysis by Plaintext Randomization
Christoph Kerschbaumer, Eric Hennigan, Stefan Brunthaler, Per Larsen and Michael Franz:
CrowdFlow: Efficient Information Flow Security
Irfan Ahmed, Golden G. Richard Iii, Aleksandar Zoranic and Vassil Roussev:
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection
Teng Guo, Feng Liu, Chuankun Wu, Young-Chang Hou, Yawei Ren and Weng Wang:
The Security Defect of a Multi-pixel Encoding Method
Steffen Wagner, Christoph Krauß and Claudia Eckert:
Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks
Mohsen Alimomeni and Reihaneh Safavi-Naini:
Human Assisted Randomness Generation Using Computer Games
Li Xi, Yu Qin and Dengguo Feng:
Formal analysis of ECC-based Direct Anonymous Attestation schemes in Applied Pi Calculus
Yanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan and Jianying Zhou:
Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data
Tadanori Teruya and Jun Sakuma:
Round-Efficient Private Stable Matching from Additive Homomorphic Encryption
Dongxia Bai and Hongbo Yu:
Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA
Lin Jiao, Bin Zhang and Mingsheng Wang:
Establishing Equations: the Complexity of Algebraic and Fast Algebraic Attacks Revisited
Sarker Tanveer Ahmed Rumee and Donggang Liu:
DroidTest: Testing Android Applications for Leakage of Private Information
Marian Kühnel and Ulrike Meyer:
4GMOP: Mopping the Malware Initiated Traffic in Mobile Networks
Ding Wang and Ping Wang:
Offline Dictionary Attack on Two Password Authentication Schemes using Smart Cards
Antoine Rojat and Antoine Joux:
Security ranking among assumptions within the Uber assumption framework

ISC 2013 Accepted Short Papers

Takashi Kitagawa, Hiroki Kojima, Nuttapong Attrapadung and Hideki Imai:
Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption
Billy Brumley and Roberto Avanzi:
Faster 128-EEA3 and 128-EIA3 Software
Routo Terada and Reynaldo C. Villena:
Factoring a multi-prime modulus N with random bits
Byungho Min and Vijay Varadharajan:
Design and Analysis of a Sophisticated Malware Attack against Smart Grid
Ping Chen, Nick Nikiforakis, Lieven Desmet and Christophe Huygens:
A Dangerous Mix: Large-scale analysis of mixed-content websites
Lusha Wang, Xing Jin, Tongbo Luo and Wenliang Du:
Fine-Grained Access Control for HTML5-Based Mobile Applications in Android
Cristina Alcaraz, Estefania Etchevés Miciolino and Stephen Wolthusen:
Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs
Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng and Jianying Zhou:
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource-constrained Devices
Naoto Yanai, Masahiro Mambo and Eiji Okamoto:
Ordered Multisignature Schemes under the CDH Assumption without Random Oracles
Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka and Noboru Kunihiro:
Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length
Vaibhav Garg and Jean Camp:
Cars, Condoms, and Facebook
Matheus Fernandes de Oliveira and Marco Aurélio Amaral Henriques:
A Secure and Efficient Method for Scalar Multiplication on Supersingular Elliptic Curve over Binary Fields
Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay:
Practical & Provably Secure Distance-Bounding
Alberto Martínez-Herrera, Carlos Mex-Perera and Juan Nolazco-Flores:
Merging the Camellia, SMS4 and AES S-boxes in a single S-box with composite bases