1581 | -- | 1592 | Magdy M. Fadel, Ali I. Eldesoky, Amira Y. Haikel, Labib M. Labib. A Low-Storage Precise IP Traceback Technique Based on Packet Marking and Logging |
1593 | -- | 1611 | Lan Zhou, Vijay Varadharajan, K. Gopinath. A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records |
1612 | -- | 1622 | Mohannad J. Alhanahnah, Arshad Jhumka, Sahel Alouneh. A Multidimension Taxonomy of Insider Threats in Cloud Computing |
1623 | -- | 1636 | Fatemeh Imani-Mehr, Mehran S. Fallah. How Powerful Are Run-Time Monitors with Static Information? |
1637 | -- | 1658 | Shifeng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu. RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions |
1659 | -- | 1668 | Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu. Identity-Based Encryption with Verifiable Outsourced Revocation |
1669 | -- | 1688 | Junqing Gong, Xiaolei Dong, Zhenfu Cao, Jie Chen 0021. Almost-Tight Identity Based Encryption Against Selective Opening Attack |
1689 | -- | 1694 | Hyung Tae Lee, San Ling, Jae Hong Seo, Huaxiong Wang. et al.'s Public Key Encryption with Authorized Equality Test |
1695 | -- | 1713 | Jiangshan Yu, Vincent Cheval, Mark Ryan. DTKI: A New Formalized PKI with Verifiable Trusted Parties |
1714 | -- | 1734 | Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu. Practical Attribute-based Signature: Traceability and Revocability |
1735 | -- | 1748 | Byungho Min, Vijay Varadharajan. Rethinking Software Component Security: Software Component Level Integrity and Cross Verification |