16 | -- | 0 | Florentin Thullier, Bruno Bouchard 0001, Bob-Antoine-Jerry Ménélas. A Text-Independent Speaker Authentication System for Mobile Devices |
17 | -- | 0 | Wenjie Che, Venkata K. Kajuluri, Fareena Saqib, Jim Plusquellic. Leveraging Distributions in Physical Unclonable Functions |
18 | -- | 0 | Anton Pljonkin, Konstantin Rumyantsev, Pradeep Kumar Singh. Synchronization in Quantum Key Distribution Systems |
19 | -- | 0 | Sarah Louise Renwick, Keith M. Martin. Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment |
20 | -- | 0 | Tom Eccles, Basel Halak. Performance Analysis of Secure and Private Billing Protocols for Smart Metering |
21 | -- | 0 | Harry Shaw. A Cryptographic System Based upon the Principles of Gene Expression |
22 | -- | 0 | George S. Eskander Ekladious, Robert Sabourin, Eric Granger. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems |
23 | -- | 0 | Chenglu Jin, Charles Herder, Ling Ren 0001, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, Marten van Dijk. FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise |
24 | -- | 0 | Hae-Duck J. Jeong, WonHwi Ahn, Hyeonggeun Kim, Jong-Suk Ruth Lee. Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim |
25 | -- | 0 | Anunay Kulshrestha, Akshay Rampuria, Matthew Denton, Ashwin Sreenivas. Cryptographically Secure Multiparty Computation and Distributed Auctions Using Homomorphic Encryption |