945 | -- | 954 | Joseph K. Liu, Sze-Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo. Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol |
955 | -- | 969 | Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Qiaoyan Wen. Online/Offline Ciphertext Retrieval on Resource Constrained Devices |
970 | -- | 982 | Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren. A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles |
983 | -- | 1004 | Zhen Liu, Duncan S. Wong. Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe |
1005 | -- | 1027 | Amir Jalaly Bidgoly, Behrouz Tork Ladani. Modeling and Quantitative Verification of Trust Systems Against Malicious Attackers |
1028 | -- | 1039 | Jiguo Li, Haiting Du, Yichen Zhang. Certificate-Based Key-Insulated Signature in the Standard Model |
1040 | -- | 1053 | Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe L. Jiang, Jianying Zhou. Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles |
1054 | -- | 1065 | Kunpeng Bai, Chuankun Wu. An AES-Like Cipher and Its White-Box Implementation |
1066 | -- | 1075 | Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme |
1076 | -- | 1090 | Mario Diego Munoz-Hernandez, Miguel Morales-Sandoval, Jose Juan Garcia Hernandez. An End-to-End Security Approach for Digital Document Management |
1091 | -- | 1101 | Haibo Yi, Shaohua Tang. Very Small FPGA Processor for Multivariate Signatures |
1102 | -- | 1112 | Haibo Yi, Shaohua Tang, Ranga Vemuri. Fast Inversions in Small Finite Fields by Using Binary Trees |