1561 | -- | 1564 | Fairouz Kamareddine. Capsule Reviews |
1565 | -- | 1581 | Monowar H. Bhuyan, D. K. Bhattacharyya, Jugal K. Kalita. Surveying Port Scans and Their Detection Methodologies |
1582 | -- | 1591 | Duc-Phong Le, Chao-Liang Liu. Refinements of Miller's Algorithm over Weierstrass Curves Revisited |
1592 | -- | 1602 | Salih Ergün. A Truly Random Number Generator Based on a Pulse-Excited Cross-Coupled Chaotic Oscillator |
1603 | -- | 1615 | Ruben Rios, Javier Lopez. Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks |
1616 | -- | 1631 | Hossein Homaei, Hamid Reza Shahriari. Compositional Approach to Quantify the Vulnerability of Computer Systems |
1632 | -- | 1644 | Kai Xi, Yan Tang, Jiankun Hu. Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment |
1645 | -- | 1651 | Yong Yu, Yi Mu, Guilin Wang, Ying Sun. Cryptanalysis of an Off-Line Electronic Cash Scheme Based on Proxy Blind Signature |
1652 | -- | 1660 | Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang. k Mins Problem |
1661 | -- | 1674 | Jun Zhang, Yang Xiang, Wanlei Zhou, Lei Ye, Yi Mu. Secure Image Retrieval Based on Visual Content and Watermarking Protocol |
1675 | -- | 1687 | Lan Zhou, Vijay Varadharajan, Michael Hitchens. Enforcing Role-Based Access Control for Secure Data Storage in the Cloud |
1688 | -- | 1699 | Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang. Fully Deniable Message Authentication Protocols Preserving Confidentiality |
1700 | -- | 1720 | Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, Yang Xiang. The Microcosmic Model of Worm Propagation |
1721 | -- | 1735 | Erika Rosas, Olivier Marin, Xavier Bonnaire. CORPS: Building a Community of Reputable PeerS in Distributed Hash Tables |