481 | -- | 493 | Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan. Server-Aided Signature Verification for Lightweight Devices |
494 | -- | 509 | Salman Niksefat, Babak Sadeghiyan, Payman Mohassel, Seyed Saeed Sadeghian. ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols |
510 | -- | 536 | Juan Manuel González Nieto, Mark Manulis, Dongdong Sun. Forward-Secure Hierarchical Predicate Encryption |
537 | -- | 556 | Monowar H. Bhuyan, Hirak Jyoti Kashyap, Dhruba Kumar Bhattacharyya, Jugal K. Kalita. Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions |
557 | -- | 566 | Tao Han, Weiming Zhang, Chao Wang, Nenghai Yu, Yue-fei Zhu. Adaptive ±1 Steganography in Extended Noisy Region |
567 | -- | 578 | Shengke Zeng, Shaoquan Jiang. A New Framework for Conditionally Anonymous Ring Signature |
579 | -- | 591 | Jinguang Han, Willy Susilo, Yi Mu, Jun Yan. Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing |
592 | -- | 601 | Limin Shen, Futai Zhang, Yinxia Sun. Efficient Revocable Certificateless Encryption Secure in the Standard Model |
602 | -- | 623 | Prasanta Gogoi, D. K. Bhattacharyya, Bhogeswar Borah, Jugal K. Kalita. MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method |
624 | -- | 635 | Faezeh Sadat Babamir, Ali Norouzi. Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare |
636 | -- | 638 | Huaqun Wang. Insecurity of 'Improved Anonymous Multi-Receiver Identity-Based Encryption' |