301 | -- | 311 | Che Wun Chiou, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh, Jeng-Shyang Pan. Low-latency digit-serial dual basis multiplier for lightweight cryptosystems |
312 | -- | 318 | Cuiping Shao, Huiyun Li, Jianbin Zhou. Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test |
319 | -- | 325 | Li Yang, Wei Huang, Xinxin Niu. Defending shilling attacks in recommender systems using soft co-clustering |
326 | -- | 331 | Samaneh Mashhadi, Massoud Hadian Dehkordi, Niloofar Kiamari. Provably secure verifiable multi-stage secret sharing scheme based on monotone span program |
332 | -- | 337 | Javier Herranz. Attribute-based encryption implies identity-based encryption |
338 | -- | 344 | Po-Hung Yang, Sung-Ming Yen. Memory attestation of wireless sensor nodes through trusted remote agents |
345 | -- | 355 | Hongchao Hu, Zhenpeng Wang, Guozhen Cheng, Jiangxing Wu. MNOS: a mimic network operating system for software defined networks |
356 | -- | 362 | Nikita Veshchikov, Sylvain Guilley. Implementation flaws in the masking scheme of DPA Contest v4 |
363 | -- | 368 | Zhen Ma, Tian Tian, Wen-Feng Qi. Internal state recovery of Grain v1 employing guess-and-determine attack |
369 | -- | 376 | Wei Yang, Yadong Wan, Qin Wang. Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things |
377 | -- | 385 | Dong Yang, Wen-Feng Qi, Hua-Jin Chen. Impossible differential attacks on the SKINNY family of block ciphers |
386 | -- | 393 | Ricardo Julio Rodríguez, Juan Carlos García-Escartín. Security assessment of the Spanish contactless identity card |