613 | -- | 624 | Toru Nakanishi 0001, Takeshi Kanatani. Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulator |
625 | -- | 632 | Eman Abouelkheir, Shamia El-sherbiny. Pairing free identity based aggregate signcryption scheme |
633 | -- | 640 | Kaushik Nath 0001, Palash Sarkar 0001. Efficient elliptic curve Diffie-Hellman computation at the 256-bit security level |
641 | -- | 653 | Geng Li, Jianwei Liu 0001, Zongyang Zhang. More realistic analysis of mass surveillance - security in multi-surveillant settings |
654 | -- | 660 | Shishi Liu, Fengrong Zhang, Enes Pasalic, Shixiong Xia, Zepeng Zhuo. Further study on constructing bent functions outside the completed Maiorana-McFarland class |
661 | -- | 669 | Sumit Kumar Debnath, Pantelimon Stanica, Tanmay Choudhury, Nibedita Kundu. Post-quantum protocol for computing set intersection cardinality with linear complexity |
670 | -- | 682 | Sona Alex, Deepthi P. Pattathil, Dhanaraj Kakkanattu Jagalchandran. SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby |
683 | -- | 693 | Emre Dandil. C-NSA: a hybrid approach based on artificial immune algorithms for anomaly detection in web traffic |
694 | -- | 703 | Samaneh Hosseini Moghaddam, Maghsoud Abbaspour. Economic feasibility study for stealthy socialbot network establishment |
704 | -- | 723 | Mukti Padhya, Devesh C. Jinwala. 2 - privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation |
724 | -- | 732 | Qi Feng, Debiao He, Huaqun Wang, Ding Wang 0002, Xinyi Huang. Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography |
733 | -- | 744 | Zhicheng Yan, Chao Yang 0016, Wei You, Jingjing Guo, Junwei Zhang, Yu Zheng, Jianfeng Ma 0001. Achieving secure and convenient WLAN sharing in personal |
745 | -- | 753 | Neha Sharma, Jeebananda Panda. Statistical watermarking approach for 3D mesh using local curvature estimation |
754 | -- | 763 | Farhad Farokhi. Non-stochastic hypothesis testing for privacy |
764 | -- | 772 | Runzhi Zeng, Libin Wang. Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem |
773 | -- | 782 | Ishu Gupta, Ashutosh Kumar Singh. GUIM-SMD: guilty user identification model using summation matrix-based distribution |
783 | -- | 790 | Jing Yang, Fang-Wei Fu. New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystem |