95 | -- | 102 | Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu. Access control requirements for structured document in cloud computing |
103 | -- | 109 | Zhonghong Sun. Fairness in the presence of semi-rational parties in rational two-party secure computation |
110 | -- | 118 | Alessandro Barenghi, Gerardo Pelosi, Federico Terraneo. Secure and efficient design of software block cipher implementations on microcontrollers |
119 | -- | 127 | Wazir Zada Khan, Mohamad Naufal bin Mohamad Saad, Mohammed Y. Aalsalem. Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks |
128 | -- | 133 | Yichun Liu. Fairness analysis of e-commerce protocols based on strand spaces |
134 | -- | 143 | Siwei Peng, Baojiang Cui, Ru Jia, Shurui Liang, Yi-Ying Zhang. A novel vulnerability detection method for ZigBee MAC layer |
144 | -- | 150 | Xudong Zhu, Hui Li, Feng Hua Li. Privacy-preserving logistic regression outsourcing in cloud computing |
151 | -- | 159 | Changji Wang, Wentao Li. An efficient attribute-based signature scheme with claim-predicate mechanism |
160 | -- | 168 | Xinfeng Ye, Bakh Khoussainov. Fine-grained access control for cloud computing |
169 | -- | 177 | Shamsul Kamal Ahmad Khalid, Mustafa Mat Deris, Kamaruddin Malik Mohamad. Anti-cropping digital image watermarking using Sudoku |
178 | -- | 186 | Jinson Zhang, Mao Lin Huang, Doan Hoang. Visual analytics for intrusion detection in spam emails |
187 | -- | 196 | Sujuan Li, Futai Zhang. Leakage-resilient identity-based encryption scheme |
197 | -- | 203 | Yuanyuan Zhang, Marine Minier. How network coding system constrains packet pollution attacks in wireless sensor networks |
204 | -- | 211 | Guangye Sui, Mohamed Mejri. FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test |
212 | -- | 218 | Jie Zhang, Futai Zhang. Linear threshold verifiable secret sharing in bilinear groups |