2193 | -- | 2194 | David G. Rosado, Nadira Lammari, Jan Jürjens. Special Issue on Secure Information Systems Engineering |
2195 | -- | 2212 | Maryam Sepehri, Stelvio Cimato, Ernesto Damiani. Privacy-Preserving Query Processing by Multi-Party Computation |
2213 | -- | 2224 | Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis. Privacy as an Integral Part of the Implementation of Cloud Solutions |
2225 | -- | 2232 | D. Marudhadevi, V. Neelaya Dhatchayani, V. S. Shankar Sriram. A Trust Evaluation Model for Cloud Computing Using Service Level Agreement |
2233 | -- | 2254 | Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina. ISGcloud: a Security Governance Framework for Cloud Computing |
2255 | -- | 2279 | Thomas Quirchmayr, Mark Strembeck. A Discussion of Communication Schemes for Process Execution Histories to Enforce Entailment Constraints in Process-Driven SOAs |
2280 | -- | 2296 | Katarzyna Mazur, Bogdan Ksiezopolski, Zbigniew Kotulski. The Robust Measurement Method for Security Metrics Generation |
2297 | -- | 2312 | Takeshi Takahashi, Youki Kadobayashi. Reference Ontology for Cybersecurity Operational Information |
2313 | -- | 2327 | Ricardo J. Rodríguez, José Merseguer, Simona Bernardi. Modelling Security of Critical Infrastructures: A Survivability Assessment |
2328 | -- | 2350 | Jose Fran. Ruiz, Antonio Maña, Carsten Rudolph. An Integrated Security and Systems Engineering Process and Modelling Framework |
2351 | -- | 2367 | Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo. Modernizing Secure OLAP Applications with a Model-Driven Approach |
2368 | -- | 2387 | Kazim Yumbul, Erkay Savas. Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms |
2388 | -- | 2403 | Udaya Kiran Tupakula, Vijay Varadharajan. Trust Enhanced Security for Tenant Transactions in the Cloud Environment |
2404 | -- | 2425 | Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett. CHURNs: Freshness Assurance for Humans |
2426 | -- | 2442 | Chunfeng Lian, Liaojun Pang, Jimin Liang. Generalized Random Grid-Based Visual Secret Sharing for General Access Structures |
2443 | -- | 2460 | Xing Wang, Nga Lam Or, Ziyan Lu, Derek Pao. Hardware Accelerator to Detect Multi-Segment Virus Patterns |
2461 | -- | 2475 | Chanying Huang, Hwaseong Lee, Hyoseung Kim, Dong-Hoon Lee. mvSERS: A Secure Emergency Response Solution for Mobile Healthcare in Vehicular Environments |
2476 | -- | 2491 | Grazielle Vernize, André Luiz Pires Guedes, Luiz Carlos Pessoa Albini. Malicious Nodes Identification for Complex Network Based on Local Views |
2492 | -- | 2506 | Jianghong Wei, Wenfen Liu, Xuexian Hu. Forward-Secure Threshold Attribute-Based Signature Scheme |
2507 | -- | 2508 | Debiao He, Mingwu Zhang, Baowen Xu. Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model |
2509 | -- | 2519 | Chang Xu, Liehuang Zhu, Zhoujun Li, Feng Wang. One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority |
2520 | -- | 2536 | Shifeng Sun, Dawu Gu, Zhengan Huang. Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks |
2537 | -- | 2556 | Zoran Djuric, Dragan Gasevic. FEIPS: A Secure Fair-Exchange Payment System for Internet Transactions |
2557 | -- | 2566 | Lanfranco Lopriore. Password Management: Distribution, Review and Revocation |
2567 | -- | 2582 | Amir Jalaly Bidgoly, Behrouz Tork Ladani. Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers |
2583 | -- | 2594 | Wien Hong, Gwoboa Horng, Chih-Wei Shiu, Tung-Shou Chen, Yu-Chi Chen. Reversible Steganographic Method Using Complexity Control and Human Visual System |
2595 | -- | 2607 | Dong Lai Fu, Xinguang Peng, Yuli Yang. Trusted Validation for Geolocation of Cloud Data |
2608 | -- | 2621 | Shahid Alam, Issa Traoré, Ibrahim Sogukpinar. Annotated Control Flow Graph for Metamorphic Malware Detection |
2622 | -- | 2635 | Md. Saiful Islam, Naif Alajlan. Model-based Alignment of Heartbeat Morphology for Enhancing Human Recognition Capability |
2636 | -- | 2648 | SK Hafizul Islam, Fagen Li. Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings |
2649 | -- | 2664 | Pericle Perazzo, Pavel Skvortsov, Gianluca Dini. On Designing Resilient Location-Privacy Obfuscators |
2665 | -- | 2676 | Yang Wang, Willy Susilo, Man Ho Au. Revisiting Security Against the Arbitrator in Optimistic Fair Exchange |
2677 | -- | 2685 | Lin Ding, Chenhui Jin, Jie Guan, ShaoWu Zhang, Ting Cui, Dong Han, Wei Zhao. Cryptanalysis of WG Family of Stream Ciphers |
2686 | -- | 2697 | Kaibin Huang, Raylin Tso, Yu-Chi Chen, Sk. Md. Mizanur Rahman, Ahmad Almogren, Atif Alamri. PKE-AET: Public Key Encryption with Authorized Equality Test |
2698 | -- | 2715 | Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai. Revocable Group Signature with Constant-Size Revocation List |
2716 | -- | 2737 | Erkay Savas, Cemal Yilmaz. A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES |
2738 | -- | 2746 | Mayana Pereira, Rafael Dowsley, Anderson C. A. Nascimento, Goichiro Hanaoka. Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions |
2747 | -- | 2757 | Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen. Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited |
2758 | -- | 2777 | André Ricardo Abed Grégio, Vitor Monte Afonso, Dario Simões Fernandes Filho, Paulo Lício de Geus, Mario Jino. Toward a Taxonomy of Malware Behaviors |
2778 | -- | 2792 | Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong. Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption |