4 | -- | 12 | Zhimin Yu, Zhengjun Jing, Hua Yang, Chunsheng Gu. ID-based multi-receiver signcryption scheme in the standard model |
13 | -- | 21 | Wei Zhou, Jian Xu, Bin Wang. A smart home foundation scheme based on open source hardware and cloud computing |
22 | -- | 29 | Bayu Adhi Tama, Kyung Hyune Rhee. Performance evaluation of intrusion detection system using classifier ensembles |
30 | -- | 35 | Yong-Hwan Lee. Virtual representation of facial avatar through weighted emotional recognition |
36 | -- | 50 | Xiaohan Yue, Fucai Zhou, Xibo Wang, Rui Li. Enhanced security model and efficient construction for direct anonymous attestation |
51 | -- | 60 | T. Subbulakshmi. A learning-based hybrid framework for detection and defence of DDoS attacks |
61 | -- | 71 | Igor V. Kotenko, Andrey Chechulin, Dmitry Komashinsky. Categorisation of web pages for protection against inappropriate content in the internet |