87 | -- | 95 | Wenying Zhang, Vincent Rijmen. Division cryptanalysis of block ciphers with a binary diffusion layer |
96 | -- | 103 | Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. Security analysis of ABAC under an administrative model |
104 | -- | 108 | Huawang Qin, Raylin Tso, Yuewei Dai. Quantum secret sharing by using Fourier transform on orbital angular momentum |
109 | -- | 116 | Weijie Han, Jingfeng Xue, Hui Yan. Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine |
117 | -- | 124 | Yongzhuang Wei, Fu Yao, Enes Pasalic, an Wang. New second-order threshold implementation of AES |
125 | -- | 132 | Yafei Zheng, Wenling Wu. On the extension and security of key schedule of GOST |
133 | -- | 140 | Aniket Bhadane, Sunil B. Mane. Detecting lateral spear phishing attacks in organisations |
141 | -- | 148 | Jun-Zhi Li, Jie Guan. Advanced conditional differential attack on Grain-like stream cipher and application on Grain v1 |
149 | -- | 156 | Rongrong Xi, Xiaochun Yun, Zhiyu Hao. Framework for risk assessment in cyber situational awareness |
157 | -- | 166 | Qiang Zhang, Jianzhong Qiao, Qingyang Meng. Build a trusted storage system on a mobile phone |