113 | -- | 118 | Gareth Owen, Nick Savage. Empirical analysis of Tor Hidden Services |
119 | -- | 124 | Xiaoming Wang, Yanchun Lin, Yu Fang. Authenticating multi-dimensional query results in outsourced database |
125 | -- | 133 | Stavros Papadopoulos 0002, Konstantinos Moustakas, Anastasios Drosou, Dimitrios Tzovaras. Border gateway protocol graph: detecting and visualising internet routing anomalies |
134 | -- | 141 | Quanqiang Zhou. Supervised approach for detecting average over popular items attack in collaborative recommender systems |
142 | -- | 151 | Yonglin Hao. Predicting the number of different dimensional cubes: theoretically evaluate the secure bound of cryptographic primitives against the balance testers |
152 | -- | 155 | Houzhen Wang, Huanguo Zhang, Shaohua Tang. Key recovery on several matrix public-key encryption schemes |
156 | -- | 164 | Reza Kazemi, Roohollah Rezaei, Mohammad Ali Akhaee, Fereidoon Behnia. Covert communications through mobile voice channels |