8th ASIACCS 2013: Hangzhou, China

Mobile devices security

Applied cryptography I

Software security

Short papers I: social network

Keynote address

Data outsourcing

Applied cryptography II

Software security

Short papers II: cloud and mobile security

Privacy and anonymity

Network security

Web and mobile security

Short paper III: software and web security

Short paper IV: applied cryptography and protocols

a service of Schloss Dagstuhl - Leibniz Center for Informatics