407 | -- | 421 | Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou. Efficient Linkable and/or Threshold Ring Signature Without Random Oracles |
422 | -- | 439 | Geraldine Vache Marconato, Mohamed Kaâniche, Vincent Nicomette. A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach |
440 | -- | 463 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan. Dynamic Access Control Policies: Specification and Verification |
464 | -- | 477 | Mingwu Zhang, Bo Yang 0003, Tsuyoshi Takagi. Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate |
478 | -- | 496 | Lanfranco Lopriore. Protection Structures in Multithreaded Systems |
497 | -- | 507 | Joonsang Baek, Quang Hieu Vu, Abdulhadi Shoufan, Andrew Jones, Duncan S. Wong. Stateful Public-Key Encryption Schemes Forward-Secure Against State Exposure |
508 | -- | 525 | Gianluca Dini, Marco Tiloca. HISS: A HIghly Scalable Scheme for Group Rekeying |