469 | -- | 471 | Jianhong Zhang, Jian Mao. On the Security of a Pairing-Free Certificateless Signcryption Scheme |
472 | -- | 495 | Emma Osborn, Andrew Simpson. Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study |
496 | -- | 511 | Haiqin Wu, Liangmin Wang, Shunrong Jiang. Secure Top-k Preference Query for Location-based Services in Crowd-outsourcing Environments |
512 | -- | 525 | Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo. Criteria-Based Encryption |
526 | -- | 538 | Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang. An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection |
539 | -- | 544 | Xi Jun Lin, Lin Sun, Haipeng Qu, Dongxiao Liu. Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme |
545 | -- | 560 | Siyuan Chen, Peng Zeng, Kim-Kwang Raymond Choo, Xiaolei Dong. Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols |
561 | -- | 574 | Qiqi Lai, Bo Yang 0003, Yong Yu, Yuan Chen, Jian Bai. Novel Smooth Hash Proof Systems Based on Lattices |
575 | -- | 585 | Husen Wang, Qiang Tang 0001. Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE |
586 | -- | 600 | Yanwei Zhou, Bo Yang 0003, Yi Mu. Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles |
601 | -- | 613 | Kamalkumar R. Macwan, Sankita J. Patel. k-NMF Anonymization in Social Network Data Publishing |
614 | -- | 628 | Kaushal A. Shah, Devesh C. Jinwala. Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks |