151 | -- | 156 | Parinaz Mahdion, Hadi Soleimany, Pouya Habibi, Farokhlagha Moazami. New single-trace side-channel attacks on a specific class of Elgamal cryptosystem |
157 | -- | 165 | Ya Wen Wang, Yunfei Guo, Zehua Guo 0001, Wenyan Liu, Chao Yang 0012. Protecting scientific workflows in clouds with an intrusion tolerant system |
166 | -- | 174 | Rui-Hong Dong, Xue-Yong Li, Qiu-yu Zhang, Hui Yuan. Network intrusion detection model based on multivariate correlation analysis - long short-time memory network |
175 | -- | 184 | Xiaoyang Liu, Jiamiao Liu. Novel non-linear dynamics P2P network worm propagation and immune model |
185 | -- | 195 | Jun Liu, Jia Yan, Dexiang Deng, Ruijue Zhang. Fingerprint image quality assessment based on BP neural network with hierarchical clustering |
196 | -- | 201 | Dung Hoang Duong, Le Van Luyen, Ha Thanh Nguyen Tran. Choosing subfields for LUOV and lifting fields for rainbow |
202 | -- | 209 | Christoph Dobraunig, Farokhlagha Moazami, Christian Rechberger, Hadi Soleimany. Framework for faster key search using related-key higher-order differential properties: applications to Agrasta |
210 | -- | 219 | Nazanin Bakhshinejad, Ali Hamzeh. Parallel-CNN network for malware detection |
220 | -- | 231 | Binbin Tu, Yu Chen, Xueli Wang. Threshold trapdoor functions and their applications |
232 | -- | 240 | Ziwang Wang, Yi Zhuang 0002, Qingxun Xia. Mutual authentication-based RA scheme for embedded systems |
241 | -- | 252 | Miguel Rodríguez-Veliz, Yulier Nuñez-Musa, Roberto Sepúlveda Lima. Call graph obfuscation and diversification: an approach |