1729 | -- | 1744 | Yang Lu 0001, Jiguo Li, Jian Shen. Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model |
1745 | -- | 1759 | El-Sayed M. El-Alfy. Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering |
1760 | -- | 1769 | Abderrahim Ait Wakrime. Satisfiability-Based Privacy-Aware Cloud Computing |
1770 | -- | 1784 | Jayashree Pougajendy, Arun Raj Kumar Parthiban. Detection of SIP-Based Denial of Service Attack Using Dual Cost Formulation of Support Vector Machine |
1785 | -- | 1800 | Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang 0016. Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size |
1801 | -- | 1808 | Damien Vergnaud. Comment on 'Attribute-Based Signatures for Supporting Anonymous Certification' by N. Kaaniche and M. Laurent (ESORICS 2016) |
1809 | -- | 1821 | Jianchang Lai, Yi Mu, Fuchun Guo, Rongmao Chen. Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization |
1822 | -- | 1838 | Sha Ma. Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting |
1839 | -- | 1851 | Howard M. Heys. Statistical Cipher Feedback of Stream Ciphers |
1852 | -- | 1870 | Xiaofang Xia, Wei Liang, Yang Xiao, Meng Zheng. Difference-Comparison-based Malicious Meter Inspection in Neighborhood Area Networks in Smart Grid |
1871 | -- | 1888 | Weiran Liu, Xiao Liu, Jianwei Liu, Qianhong Wu. Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds |
1889 | -- | 1911 | Xavier Bonnaire, Rudyar Cortes, Fabrice Kordon, Olivier Marin. ASCENT: A Provably Terminating Decentralized Logging Service |
1912 | -- | 1922 | Dario Fiore, Maria Isabel Gonzalez Vasco, Claudio Soriente. Partitioned Group Password-Based Authenticated Key Exchange |