1147 | -- | 0 | Fairouz Kamareddine. Capsule Reviews |
1148 | -- | 1156 | Manoj Thomas, Gurpreet Dhillon. Interpreting Deep Structures of Information Systems Security |
1157 | -- | 1168 | Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang, Li Xu. A Provably Secure Construction of Certificate-Based Encryption from Certificateless Encryption |
1169 | -- | 1179 | Yu-Fang Chung, Zhen Yu Wu. Casting Ballots over Internet Connection Against Bribery and Coercion |
1180 | -- | 1191 | Chang Xu, Zhoujun Li, Yi Mu, Hua Guo, Tao Guo. Affiliation-Hiding Authenticated Asymmetric Group Key Agreement |
1192 | -- | 1201 | Lin Ding, Jie Guan. Cryptanalysis of Loiss Stream Cipher |
1202 | -- | 1215 | Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Attribute-Based Oblivious Access Control |
1216 | -- | 1231 | Derek Pao, Xing Wang. Multi-Stride String Searching for High-Speed Content Inspection |
1232 | -- | 1243 | Hyejin Son, Tae Yoon Kang, Hwangnam Kim, Jong-Bae Park, Jae Hyung Roh. A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid |
1244 | -- | 1264 | Nimalaprakasan Skandhakumar, Jason Reid, Ed Dawson, Robin Drogemuller, Farzad Salim. An Authorization Framework using Building Information Models |
1265 | -- | 0 | João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro. Corrigendum: Exploring Behavioral Patterns Through Entropy in Multimedia Peer-to-Peer Traffic |
1266 | -- | 0 | Paul S. Rosenbloom. Erratum: Computing and Computation |