167 | -- | 173 | Limin Shen, Jianfeng Ma, Yinbin Miao, Hai Liu. Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model |
174 | -- | 187 | Fuzhi Zhang, Zhoujun Ling, Shilei Wang. Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours |
188 | -- | 200 | Thankaraja Raja Sree, Somasundaram Mary Saira Bhanu. HAP: detection of HTTP flooding attacks in cloud using diffusion map and affinity propagation clustering |
201 | -- | 212 | Somayeh Soltani, Seyed-Amin Hosseini-Seno, Hadi Sadoghi Yazdi. Event reconstruction using temporal pattern of file system modification |
213 | -- | 222 | Ghania Ait Abdelmalek, Rezki Ziani, Rabah Mokdad. Security and fault tolerance evaluation of TMR-QDI circuits |
223 | -- | 230 | Muhammad Sohail, Liangmin Wang, Shunrong Jiang, Samar Zaineldeen, Rana Umair Ashraf. ad-hoc networks using three-valued subjective logic |
231 | -- | 238 | Aashish Parihar, Sangeeta Nakhate. Fast Montgomery modular multiplier for Rivest-Shamir-Adleman cryptosystem |
239 | -- | 248 | Mikel Uriarte, Jasone Astorga, Eduardo Jacob, Maider Huarte, Óscar López. Impact assessment of policy expressiveness of an optimised access control model for smart sensors |
249 | -- | 257 | Bekir Unlu. Base for algebraic cryptanalysis based on combined representation of S-box |
258 | -- | 268 | Zhigang Zhang, Chaowen Chang, Zhimin Guo, PeiSheng Han. Re-definable access control over outsourced data in cloud storage systems |
269 | -- | 277 | Ahmet Ilhan Aysan, Fatih Sakiz, Sevil Sen. Analysis of dynamic code updating in Android with security perspective |
278 | -- | 284 | Maryam Sheikhi-Garjan, Mojtaba Bahramian, Christophe Doche. Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem |
285 | -- | 292 | Meng Yue, Zhijun Wu, Jingjie Wang. Detecting LDoS attack bursts based on queue distribution |