1 | -- | 7 | Clémentine Gritti, Willy Susilo, Thomas Plantard. Logarithmic size ring signatures without random oracles |
8 | -- | 17 | Weiqiang Wen, Libin Wang, Jiaxin Pan. Unified security model of authenticated key exchange with specific adversarial capabilities |
18 | -- | 27 | Xin Xie, Bin Lu, Daofu Gong, Xiangyang Luo, Fenlin Liu. Random table and hash coding-based binary code obfuscation against stack trace analysis |
28 | -- | 32 | Yimin Guo, Shundong Li, Jiawei Dou, Sufang Zhou. Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems |
33 | -- | 36 | José Luis Salazar, José Luis Tornos, Joan Josep Piles. Efficient ways of prime number generation for ring signatures |
37 | -- | 44 | Hao Wu, Xianglei Dang, Lidong Wang, Longtao He. Information fusion-based method for distributed domain name system cache poisoning attack detection and identification |
45 | -- | 52 | Haichang Gao, Xuqin Wang, Fang Cao, Zhengya Zhang, Lei Lei, Jiao Qi, Xiyang Liu. Robustness of text-based completely automated public turing test to tell computers and humans apart |