1109 | -- | 1122 | Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort. A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System |
1123 | -- | 1132 | Rong Wang, Yan Zhu 0007, Tung-Shou Chen, Chin-Chen Chang 0001. An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining |
1133 | -- | 1142 | Haijiang Wang, Xiaolei Dong, Zhenfu Cao, Dongmei Li. Secure and Efficient Attribute-Based Encryption with Keyword Search |
1143 | -- | 1157 | Gunikhan Sonowal, K. S. Kuppusamy. SmiDCA: An Anti-Smishing Model with Machine Learning Approach |
1158 | -- | 1165 | Rongjia Li, Chenhui Jin. Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128 |
1166 | -- | 1179 | Xiaojuan Zhang 0003, Xiutao Feng, Dongdai Lin. Fault Attack on ACORN v3 |
1180 | -- | 1201 | Amir Daneshgar, Fahimeh Mohebbipoor. A Secure Self-Synchronized Stream Cipher |
1202 | -- | 1215 | Baoguo Yuan, Junfeng Wang 0003, Zhiyang Fang, Li Qi. A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection |
1216 | -- | 1227 | Jianye Huang, Qiong Huang, Willy Susilo. Leakage-Resilient Dual-Form Signatures |
1228 | -- | 1239 | Dianyan Xiao, Yang Yu 0008. Klepto for Ring-LWE Encryption |
1240 | -- | 1251 | Jianchang Lai, Yi Mu 0001, Fuchun Guo, Peng Jiang, Sha Ma. Identity-Based Broadcast Encryption for Inner Products |
1252 | -- | 1258 | Ya Liu 0001, Anren Yang, Bo Dai, Wei Li 0013, Zhiqiang Liu, Dawu Gu, Zhiqiang Zeng. Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128 |
1259 | -- | 1268 | Baodong Qin, Qinglan Zhao, Dong Zheng 0001. Bounded Revocable and Outsourceable ABE for Secure Data Sharing |