1707 | -- | 1733 | Nghi Huynh, Marc Frappier, Herman Pooda, Amel Mammar, Régine Laleau. SGAC: A Multi-Layered Access Control Model with Conflict Resolution Strategy |
1734 | -- | 1747 | Binlin Cheng, Jinjun Liu, Jiejie Chen, Shudong Shi, Xufu Peng, Xingwen Zhang, Haiqing Hai. MoG: Behavior-Obfuscation Resistance Malware Detection |
1748 | -- | 1760 | Yang Chen, Wenmin Li, Fei Gao 0001, Wei Yin 0004, Kaitai Liang, Hua Zhang 0001, Qiaoyan Wen. Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures |
1761 | -- | 1776 | Ya Liu 0001, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li 0013, Zhiqiang Liu, Yang Bao. Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC |
1777 | -- | 1792 | Zhenhui Han, Xingshu Chen, Xuemei Zeng, Yi Zhu, MingYong Yin. Detecting Proxy User Based on Communication Behavior Portrait |
1793 | -- | 1804 | Jianghua Zhong, Dongdai Lin. On Equivalence of Cascade Connections of Two Nonlinear Feedback Shift Registers |
1805 | -- | 1821 | Lele Chen, Gaoli Wang, Guoyan Zhang. MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS |
1822 | -- | 1839 | Venkatraman Subbarayalu, B. Surendiran, P. Arun Raj Kumar. Hybrid Network Intrusion Detection System for Smart Environments Based on Internet of Things |
1840 | -- | 1848 | Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang. A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type |
1849 | -- | 1862 | San Ling, Khoa Nguyen, Huaxiong Wang, Juanyang Zhang. Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation |