495 | -- | 507 | Zhichao Yang, Rongmao Chen, Chao Li 0002, Longjiang Qu, Guomin Yang. On the Security of LWE Cryptosystem against Subversion Attacks |
508 | -- | 524 | Yanwei Zhou, Bo Yang 0003, Tao Wang 0039, Zhe Xia, Hong-xia Hou. Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings |
525 | -- | 535 | Zhen Zhao 0005, Ge Wu 0001, Fuchun Guo, Willy Susilo, Yi Mu 0001, Baocang Wang, Yupu Hu. Black-Box Accountable Authority Identity-Based Revocation System |
536 | -- | 548 | Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang. A New Construction for Linkable Secret Handshake |
549 | -- | 566 | Hao Wang, Kaiju Li. Resistance of IID Noise in Differentially Private Schemes for Trajectory Publishing |
567 | -- | 592 | Jiafu Jiang, Linyu Tang, Ke Gu, Weijia Jia. Secure Computing Resource Allocation Framework For Open Fog Computing |
593 | -- | 603 | Er-Rajy Latifa, My Ahmed El Kiram, Mohamed El Ghazouani. New Security Risk Value Estimate Method for Android Applications |
604 | -- | 619 | Leyli Javid Khayati, Erkay Savas, Halit Alptekin. Intrusion Detection Over Encrypted Network Data |
620 | -- | 632 | Xuecheng Ma, Dongdai Lin. Server-aided Revocable IBE with Identity Reuse |
633 | -- | 647 | Qiang Wang 0005, Fucai Zhou, Jian Xu 0004, Zifeng Xu. A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications |
648 | -- | 656 | Meijuan Huang, Bo Yang 0003, Mingwu Zhang, Lina Zhang, Hong-xia Hou. Updatable Lossy Trapdoor Functions Under Consecutive Leakage |