1151 | -- | 1153 | Young-Sik Jeong, Damien Sauveron, Jong Hyuk Park. Advanced Security Technologies and Services for Future Computing Environments |
1154 | -- | 1166 | Guangjie Han, Jinfang Jiang, Lei Shu, Mohsen Guizani, Shojiro Nishio. A Two-Step Secure Localization for Wireless Sensor Networks |
1167 | -- | 1175 | Yao-Hsin Chou, Shuo-Mao Chen, Yu-Ting Lin, Chi-Yuan Chen, Han-Chieh Chao. Using GHZ-State for Multiparty Quantum Secret Sharing Without Code Table |
1176 | -- | 1188 | Bin Zhang, Jiahai Yang, Jianping Wu, Ziyu Wang. MBST: Detecting Packet-Level Traffic Anomalies by Feature Stability |
1189 | -- | 1197 | Jong-Hyouk Lee, Thierry Ernst. IPv6 Security Issues in Cooperative Intelligent Transportation Systems |
1198 | -- | 1215 | Andreu Pere Isern-Deyà, Arnau Vives-Guasch, Macià Mut Puigserver, Magdalena Payeras-Capellà, Jordi Castellà-Roca. A Secure Automatic Fare Collection System for Time-Based or Distance-Based Services with Revocable Anonymity for Users |
1216 | -- | 1227 | Aikaterini Mitrokotsa, Pedro Peris-Lopez, Christos Dimitrakakis, Serge Vaudenay. On Selecting the Nonce Length in Distance-Bounding Protocols |
1228 | -- | 1248 | Yinghui Zhang, Xiaofeng Chen 0001, Hui Li. Key-Evolving Hierarchical ID-Based Signcryption |
1249 | -- | 1257 | Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang. Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption |
1258 | -- | 1267 | Gerard Draper-Gil, Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos, Jianying Zhou. An Asynchronous Optimistic Protocol for Atomic Multi-Two-Party Contract Signing |