481 | -- | 489 | Gaoli Wang, Zhenfu Cao, Xiaolei Dong. Improved Fault-Tolerant Aggregate Signatures |
490 | -- | 506 | Hui Guo, Zhenfeng Zhang, Jing Xu 0002, Ningyu An. Non-transferable Proxy Re-encryption |
507 | -- | 517 | Fatemeh Rezaeibagha, Yi Mu 0001. Efficient Micropayment of Cryptocurrency from Blockchains |
518 | -- | 534 | Van Tuyen Dang, Thu-Huong Truong, Nguyen Huu Thanh, Pham Ngoc Nam 0001, Ngoc Thanh Nguyen, Alan Marshall. SDN-Based SYN Proxy - A Solution to Enhance Performance of Attack Mitigation Under TCP SYN Flood |
535 | -- | 544 | Rongjia Li, Chenhui Jin, Ruya Fan. Improved Integral Distinguishers on Compression Function of GOST R Hash Function |
545 | -- | 562 | Kwangsu Lee, Dong-Hoon Lee, Jong Hwan Park, Moti Yung. CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts |
563 | -- | 578 | Ming Zeng, Kai Zhang 0016, Haifeng Qian, Xiaofeng Chen, Jie Chen. A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications |
579 | -- | 597 | HongYun Cai, Fuzhi Zhang. An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items |
598 | -- | 613 | Muhammed Ali Bingöl, Osman Biçer, Mehmet Sabir Kiraz, Albert Levi. An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates |
614 | -- | 630 | Keita Emura, Hayato Kimura, Toshihiro Ohigashi, Tatsuya Suzuki 0002. Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations |
631 | -- | 640 | Yi Zhao, Yong Yu 0002, Bo Yang 0003. Leakage Resilient CCA Security in Stronger Model: Branch Hidden ABO-LTFs and Their Applications |