1 | -- | 6 | Kamaldeep, Manisha Malik, Maitreyee Dutta. Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks |
7 | -- | 14 | Junjie Lv, Juling Rong. Virtualisation security risk assessment for enterprise cloud services based on stochastic game nets model |
15 | -- | 24 | Golnar Assadat Afzali, Shahriar Mohammadi. Privacy preserving big data mining: association rule hiding using fuzzy logic approach |
25 | -- | 33 | Hridoy Jyoti Mahanta, Ajoy Kumar Khan. Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation |
34 | -- | 41 | Maryam Rajabzadeh Asaar, Mohammad Hassan Ameri, Mahmoud Salmasizadeh, Mohammad Reza Aref. A provably secure code-based concurrent signature scheme |
42 | -- | 51 | Shijun Xiang, Jiayong He. Database authentication watermarking scheme in encrypted domain |
52 | -- | 59 | Sébastien Canard, Duong Hieu Phan, Viet Cuong Trinh. Attribute-based broadcast encryption scheme for lightweight devices |
60 | -- | 70 | Hassan Seifi, Saeed Parsa. Mining malicious behavioural patterns |
71 | -- | 78 | Zheng Yang, Junyu Lai, Guoyuan Li. Cryptanalysis of a generic one-round key exchange protocol with strong security |
79 | -- | 86 | Maria Isabel Gonzalez Vasco, Angel L. Pérez del Pozo, Adriana Suárez Corona. Group key exchange protocols withstanding ephemeral-key reveals |
87 | -- | 93 | Kai Zhang, Jie Guan, Bin Hu, Dongdai Lin. Security evaluation on Simeck against zero-correlation linear cryptanalysis |
94 | -- | 99 | En Zhang, Jie Peng, Ming Li. Outsourcing secret sharing scheme based on homomorphism encryption |
100 | -- | 106 | Shaoquan Jiang, Jue Li, Yongjian Liao. Efficient approximate message authentication scheme |