107 | -- | 117 | Abdurrahman Pektas, Tankut Acarman. Malware classification based on API calls and behaviour analysis |
118 | -- | 126 | William J. Buchanan, Scott Helme, Alan Woodward. Analysis of the adoption of security headers in HTTP |
127 | -- | 132 | Shuaijianni Xu, Liang Feng Zhang. Cryptanalysis of Morillo-Obrador polynomial delegation schemes |
133 | -- | 140 | Jianxiong Shao, Yu Qin, Dengguo Feng. Formal analysis of HMAC authorisation in the TPM2.0 specification |
141 | -- | 149 | Shangping Wang, Xia Zhang, Yaling Zhang. Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control |
150 | -- | 156 | Girraj Kumar Verma, B. B. Singh. Efficient identity-based blind message recovery signature scheme from pairings |
157 | -- | 164 | Xiaonan Wang, Zhengxiong Dou, Yi Mu. CCN framework with privacy support |