439 | -- | 451 | Wuqiang Shen, Shaohua Tang. RGB, a Mixed Multivariate Signature Scheme |
452 | -- | 461 | Leyou Zhang, Yi Mu, Qing Wu. Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys |
462 | -- | 492 | Simeon Veloudis, Nimal Nissanke. A Novel Permission Hierarchy for RBAC for Dealing with SoD in MAC Models |
493 | -- | 507 | Mingwu Zhang, Yi Mu. Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations |
508 | -- | 521 | Joonsang Baek, Duncan S. Wong, Jin Li, Man Ho Au. Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction |
522 | -- | 540 | Peng Zhou, Xiaojing Gu, Rocky K. C. Chang. Harvesting File Download Exploits in the Web: A Hacker's View |
541 | -- | 548 | Xinran Li, Chen-Hui Jin, Fang-Wei Fu. Improved Results of Impossible Differential Cryptanalysis on Reduced FOX |
549 | -- | 558 | Guo-qiang Liu, Chen-Hui Jin. Linear Cryptanalysis of PRESENT-like Ciphers with Secret Permutation |
559 | -- | 569 | Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang. Anonymous Proxy Signature with Hierarchical Traceability |
570 | -- | 591 | Emma Osborn, Andrew C. Simpson. On Safety and Security Requirements in Emerging Ubiquitous Computing Models |
592 | -- | 601 | Hung-Yu Chien. A Generic Approach to Improving Diffie-Hellman Key Agreement Efficiency for Thin Clients |