1 | -- | 7 | Hasan Taha, Emad Alsusa. Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing |
8 | -- | 15 | Xi Xiao, Zhenlong Wang, Qing Li, Shu-Tao Xia, Yong Jiang. Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences |
16 | -- | 22 | Muhammad Nasir Mumtaz Bhutta, Haitham S. Cruickshank, Zhili Sun. Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks |
23 | -- | 33 | Y. Sreenivasa Rao. Signature-policy attribute-based key-insulated signature |
34 | -- | 37 | Moon Sung Lee. Sparse subset sum problem from Gentry-Halevi's fully homomorphic encryption |
38 | -- | 45 | Wenjun Fan, David Fernández, Zhihui Du. Versatile virtual honeynet management framework |
46 | -- | 53 | Zhen Ma, Tian Tian, Wen-Feng Qi. Improved conditional differential attacks on Grain v1 |