389 | -- | 397 | Jiqiang Lu, Wun-She Yap, Yongzhuang Wei. Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis |
398 | -- | 403 | Tzuo-Yau Fan, Her-Chang Chao. User-friendly XOR-based visual secret sharing by random grid |
404 | -- | 413 | Guillermo Suarez-Tangil, Santanu Kumar Dash, Pedro García Teodoro, José Camacho, Lorenzo Cavallaro. Anomaly-based exploratory analysis and detection of exploits in android mediaserver |
414 | -- | 418 | Zhixiong Chen. Linear complexity of Legendre-polynomial quotients |
419 | -- | 424 | Dong Yang, Wen-Feng Qi, Hua-Jin Chen. Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0 |
425 | -- | 430 | Dan Wang, Bing Guo, Yan Shen. Method for measuring the privacy level of pre-published dataset |
431 | -- | 437 | Tao Chen, Michael Farcasin, Eric Chan-Tin. Smartphone passcode prediction |
438 | -- | 444 | Penglin Yang, Limin Tao, Haitao Wang. RTTV: a dynamic CFI measurement tool based on TPM |
445 | -- | 454 | Tongxiang Wang, Tao Liang, Jianhua Fan, Xianglin Wei. Sequential opening multi-jammers localisation in multi-hop wireless network |
455 | -- | 461 | Emre Yüce, Ali Aydn Selçuk. Server notaries: a complementary approach to the web PKI trust model |