1145 | -- | 1162 | Mojtaba Rafiee, Shahram Khazaei. Private Set Operations Over Encrypted Cloud Dataset and Applications |
1163 | -- | 1177 | Zirui Qiao, Qiliang Yang, Yanwei Zhou, Zhe Xia, Mingwu Zhang. Novel Public-Key Encryption with Continuous Leakage Amplification |
1178 | -- | 1192 | Haixia Chen, Xinyi Huang, Wei Wu 0001, Yi Mu 0001. Privacy-Aware Image Authentication from Cryptographic Primitives |
1193 | -- | 1214 | Ehsan Farzadnia, Hossein Shirazi, Alireza Nowroozi. A New Intrusion Detection System Using the Improved Dendritic Cell Algorithm |
1215 | -- | 1225 | Yong Fang, Yuchi Zhang, Cheng Huang. CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network |
1226 | -- | 1238 | Hao Lin, Zhen Zhao 0005, Fei Gao 0001, Willy Susilo, Qiaoyan Wen, Fuchun Guo, Yijie Shi. Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage |
1239 | -- | 1252 | Sha Ma, Qiong Huang. CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model |
1253 | -- | 1263 | Sudong Ma, Jie Guan. Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher |
1264 | -- | 1276 | Gaoli Wang, Zhenfu Cao, Xiaolei Dong. Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory |
1277 | -- | 1292 | Hailong Zhang 0001, Wei Yang. Theoretical Estimation on the Success Rate of the Asymptotic Higher Order Optimal Distinguisher |
1293 | -- | 1302 | Ji Sun Shin, Minjae Jo, Jung Yeon Hwang, Jaehwan Lee 0001. A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware |
1303 | -- | 1314 | Yangguang Tian, Yingjiu Li, Yi Mu 0001, Guomin Yang. Unlinkable and Revocable Secret Handshake |