1 | -- | 12 | Kunwar Singh, C. Pandu Rangan, Samir Sheshank, Richa Agrawal. Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes |
13 | -- | 22 | Krishnaraj Bhat, K. R. Udaya Kumar Reddy, Ranjan Kumar H. S., Dindayal Mahto. A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography |
23 | -- | 37 | Khalid T. Al-Sarayreh, Mamdouh Alenezi, Mohammad Zarour, Kenza Meridji. A reference measurement framework of software security product quality (SPQNFSR) |
38 | -- | 58 | Yassine Lemmou, Jean-Louis Lanet, El Mamoun Souidi. A behavioural in-depth analysis of ransomware infection |
59 | -- | 75 | Cengiz Acartürk, Murat Ulubay, Efe Erdur. Continuous improvement on maturity and capability of Security Operation Centres |
76 | -- | 86 | Xue Ge, Jiawei Dou, Wenli Wang, Yingnan Wang. Private feasible solution determination |
87 | -- | 97 | Yanjun Li, Jie Peng, Chik-How Tan, Haibin Kan, Lijing Zheng. Further constructions of bent functions and their duals |
98 | -- | 106 | Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee. An efficient lattice-based threshold signature scheme using multi-stage secret sharing |
107 | -- | 116 | Guanhao Xue, Baocang Wang, Quanbo Qu, Weidong Zhang. Efficient lattice-based authenticated key exchange based on key encapsulation mechanism and signature |
117 | -- | 130 | Ozgur Oksuz. Time-specific encrypted range query with minimum leakage disclosure |
131 | -- | 146 | Yumei Li, Futai Zhang, Yinxia Sun. Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system |