1125 | -- | 1138 | Mahmood Yousefi Azar, Len Hamey, Vijay Varadharajan, Shiping Chen 0001. Byte2vec: Malware Representation and Feature Selection for Android |
1139 | -- | 1147 | Wenjie Yang, Jian Weng 0001, Xinyi Huang, Anjia Yang. A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks |
1148 | -- | 1167 | Robab Alyari, Jaber Karimpour, Habib Izadkhah. Specifying a New Requirement Model for Secure Adaptive Systems |
1168 | -- | 1193 | María Magdalena Payeras Capellà, Macià Mut Puigserver, Pau Conejero-Alberola, Jordi Castellà-Roca, Llorenç Huguet i Rotger. Implementation And Evaluation Of The mCityPASS Protocol For Secure And Private Access To Associated Touristic Services |
1194 | -- | 1202 | Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran. A Multivariate Blind Ring Signature Scheme |
1203 | -- | 1215 | Yang Chen, Wenmin Li, Fei Gao 0001, Kaitai Liang, Hua Zhang 0001, Qiaoyan Wen. Practical Attribute-Based Conjunctive Keyword Search Scheme |
1216 | -- | 1230 | Wei Guo, Su-Juan Qin, Jun Lu, Fei Gao 0001, Zhengping Jin, Qiaoyan Wen, Daniele Sgandurra. Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage |
1231 | -- | 1246 | Haibo Zhou, Zheng Li 0008, Xiaoyang Dong, Keting Jia, Willi Meier, Tomer Ashur. Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak |
1247 | -- | 1258 | Muhua Liu, Ping Zhang. An Adaptively Secure Functional Encryption for Randomized Functions |
1259 | -- | 1262 | Xi Jun Lin, Lin Sun 0005, Zhen Yan, Xiaoshuai Zhang, Haipeng Qu, Liqun Chen. On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model |
1263 | -- | 1270 | Xi Jun Lin, Lin Sun 0005, Haipeng Qu, Kaitai Liang. Leakage-free ID-Based Signature, Revisited |
1271 | -- | 0 | Qianqian Su, Rui Zhang 0016, Rui Xue 0001. Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud |