515 | -- | 517 | Zhiyong Zhang. Security, Trust and Risk in Multimedia Social Networks |
518 | -- | 535 | Constantinos Patsakis, Athanasios Zigomitros, Achilleas Papageorgiou, Agusti Solanas. Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures |
536 | -- | 548 | Hui Zhu, Cheng Huang, Hui Li. Information Diffusion Model Based on Privacy Setting in Online Social Networking Services |
549 | -- | 571 | Hong Zhu, Shengli Tian, Kevin Lü. Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity |
572 | -- | 587 | WeiTao Song, Bin Hu. Approach to Detecting Type-Flaw Attacks Based on Extended Strand Spaces |
588 | -- | 600 | Bin Yang, Xingming Sun, Xianyi Chen, Jianjun Zhang, Xu Li. Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows |
601 | -- | 626 | Ayesha Kanwal, Rahat Masood, Muhammad Awais Shibli, Rafia Mumtaz. Taxonomy for Trust Models in Cloud Computing |
627 | -- | 643 | Qingqi Pei, Dingyu Yan, Lichuan Ma, Zi Li, Yang Liao. A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks |
644 | -- | 655 | Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai. Sensational Headline Identification By Normalized Cross Entropy-Based Metric |
656 | -- | 667 | Hui Lin, Jia Hu, Jianfeng Ma, Li Xu, Li Yang. CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks |
668 | -- | 678 | Zhiyong Zhang, Kanliang Wang. A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks |
679 | -- | 687 | V. Natarajan, Shina Sheen, R. Anitha 0002. Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks |
688 | -- | 699 | Guowei Wu, Zuosong Liu, Lin Yao, Jing Deng, Jie Wang. A Trust Routing for Multimedia Social Networks |
700 | -- | 708 | Danmei Niu, Lanlan Rui, Cheng Zhong, Xuesong Qiu. A Composition and Recovery Strategy for Mobile Social Network Service in Disaster |
709 | -- | 723 | Volkmar Lotz, Francesco Di Cerbo, Michele Bezzi, Samuel Paul Kaluvuri, Antonino Sabetta, Slim Trabelsi. Security Certification for Service-Based Business Ecosystems |
724 | -- | 734 | Qiang Tang, Hua Ma, Xiaofeng Chen 0001. Extend the Concept of Public Key Encryption with Delegated Search |
735 | -- | 749 | Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu. Functional Encryption Resilient to Hard-to-Invert Leakage |
750 | -- | 757 | Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang. Leakage-Free ID-Based Signature |
758 | -- | 778 | M. Francisca Hinarejos, Andreu Pere Isern-Deyà, Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà. MC-2D: An Efficient and Scalable Multicoupon Scheme |
779 | -- | 781 | Ying-Kai Tang, Sherman S. M. Chow, Joseph K. Liu. Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model' |
782 | -- | 791 | Lanfranco Lopriore. Password Capabilities Revisited |
792 | -- | 807 | Ke Gu, Weijia Jia, Chunlin Jiang. Efficient Identity-Based Proxy Signature in the Standard Model |
808 | -- | 822 | Debasish Das, Utpal Sharma, D. K. Bhattacharyya. Detection of Cross-Site Scripting Attack under Multiple Scenarios |
823 | -- | 830 | Xinyu Fan, Guomin Yang, Yi Mu, Yong Yu. On Indistinguishability in Remote Data Integrity Checking |
831 | -- | 852 | Alptekin Küpçü. Official Arbitration with Secure Cloud Storage Application |
853 | -- | 866 | Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou. A Forward-Secure Certificate-Based Signature Scheme |
867 | -- | 877 | Yong Yu, Man Ho Au, Yi Mu, Willy Susilo, Huai Wu. Secure Delegation of Signing Power from Factorization |
878 | -- | 891 | Hai L. Vu, Kenneth K. Khaw, Tsong Yueh Chen. A New Approach for Network Vulnerability Analysis |
892 | -- | 903 | Stavros N. Shiaeles, Maria Papadaki. FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks |
904 | -- | 921 | Huacui Liu, Chenhui Jin. Lower Bounds of Differential and Linear Active S-boxes for 3D-like Structure |
922 | -- | 933 | Yu-Chi Chen. SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing Attacks |
934 | -- | 943 | Cheng-Chi Lee, Yan-Ming Lai. Toward A Secure Single Sign-On Mechanism for Distributed Computer Networks |
944 | -- | 960 | Franco Frattolillo. Watermarking Protocols: Problems, Challenges and a Possible Solution |
961 | -- | 972 | Abdulah Abdulah Zadeh, Howard M. Heys. Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers |
973 | -- | 985 | Haider Salim Hmood, Zhitang Li, Hasan Khalaf Abdulwahid, Yang Zhang. Adaptive Caching Approach to Prevent DNS Cache Poisoning Attack |
986 | -- | 1002 | Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang. Public Key Encryption with Delegated Equality Test in a Multi-User Setting |
1003 | -- | 1020 | Qiang Tang. From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data |
1021 | -- | 1039 | Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Willy Susilo. An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its Variants |