457 | -- | 475 | Tomasz Hyla, Jerzy Pejas. A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates |
476 | -- | 490 | Jeremy Maitin-Shepard, Mehdi Tibouchi, Diego F. Aranha. Elliptic Curve Multiset Hash |
491 | -- | 496 | Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang. Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme |
497 | -- | 506 | Shaoquan Jiang. Bounds for Message Authentication with Distortion |
507 | -- | 526 | Jing Liu, Yunyun Wu, Xuezheng Liu, Yunchun Zhang, Gang Xue. On the (In)Security of Recent Group Key Distribution Protocols |
527 | -- | 540 | Kenneth Radke, Colin Boyd. Security Proofs for Protocols Involving Humans |
541 | -- | 554 | Leyou Zhang, Jingxia Zhang, Yi Mu. Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System |
555 | -- | 572 | Emin Islam Tatli, Bedirhan Urgun. WIVET - Benchmarking Coverage Qualities of Web Crawlers |
573 | -- | 587 | Muhammet Yildiz, Berrin A. Yanikoglu, Alisher Kholmatov, Alper Kanak, Umut Uludag. Biometric Layering with Fingerprints: Template Security and Privacy Through Multi-Biometric Template Fusion |
588 | -- | 599 | Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li. Anonymous Announcement System (AAS) for Electric Vehicle in VANETs |
600 | -- | 612 | Yujue Wang, HweeHwa Pang. Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases |
613 | -- | 624 | Wentan Yi, Shaozhen Chen, Yuchen Li. Zero-correlation Linear Cryptanalysis of SAFER Block Cipher Family Using the Undisturbed Bits |