191 | -- | 202 | Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, Wei Wu. Cooperative attribute-based access control for enterprise computing system |
203 | -- | 215 | Zhi-Yi Shao, Bo Yang. Proof of retrievability with efficient verification |
216 | -- | 229 | Chengyu Hu, Zuoxia Yu, Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Qixia Yuan. Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption |
230 | -- | 243 | XiaoBo Chu, Dengguo Feng. On the provable security of TPM2.0 cryptography APIs |
244 | -- | 256 | Nan Jiang, Sixin Jin, Tao Wan, Yueshun He. MVP: modelling virus propagation for IPv6 wireless sensor networks |
257 | -- | 265 | Fushan Wei, Jianfeng Ma, Chuangui Ma, Xinghua Li. A two-factor authenticated key exchange protocol based on RSA with dynamic passwords |
266 | -- | 279 | Jingwei Liu, Qian Li, Rong Sun, Sawand Muhammad Ajmal. Energy-efficient key agreement protocols for wireless body area networks |
280 | -- | 288 | Ling Liu, Hanyu Quan, Xuefeng Liu, Yuqing Zhang. Lightweight handover authentication with location privacy-preserving in mobile wireless networks |
289 | -- | 295 | Wujun Zhang, Xiaohui Wang, Yunya Zhou, Hua Deng, YuMin Wang. A GAA-based batch authentication and key agreement for LTE networks |
296 | -- | 305 | Satria Mandala, Md. Asri Ngadi, Johan Mohamad Sharif, M. Soperi Mohd Zahid, Farhan Mohamed. Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks |
306 | -- | 317 | Song Luo. Anonymous hierarchical identity-based encryption without key delegation in decryption |
318 | -- | 323 | Junjie Peng, Yuanyuan Chen. A low energy consumption WSN node |
324 | -- | 333 | Zhongwen Li, Qian Li, Zhibin Xu, Hai Jiang, Kuan-Ching Li. A secured transmission model for EPC network |
334 | -- | 344 | Jingzhao Li, Ren Ping, Ling-Ling Shi, Shunxiang Zhang. Optimisation of moving target's low-power and high-precision monitoring with RSSI based on static and dynamic clustering |