58 | -- | 76 | Hicham El Khoury, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun. A data flow-oriented specification method for analysing network security configurations |
77 | -- | 86 | Mohammed A. Ambusaidi, Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda, Liang Fu Lu, Aruna Jamdagni. Intrusion detection method based on nonlinear correlation measure |
87 | -- | 95 | Xiaoping Lou, Jun Dai, Zhigang Chen, Moon Ho Lee. An efficient quantum anonymous communication with hybrid entanglement swapping |
96 | -- | 106 | Yang Lu, Jiguo Li. Efficient constructions of certificate-based key encapsulation mechanism |
107 | -- | 115 | Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang. Efficient identity-based threshold signature scheme from bilinear pairings in standard model |
116 | -- | 121 | Li Zhang, Ying Guo, Dazu Huang. High-efficient quantum secret sharing with arrangements of lines on two-dimensional planes |
122 | -- | 129 | Wei Ren, Jiahua Lin, Qiang Cao, Liangli Ma. LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing |
130 | -- | 142 | Wei Yang, Yong-peng Gao, Zhiliang Zhu, Guiran Chang, Yu Yao. Modelling, analysis and containment of passive worms in P2P networks |
143 | -- | 149 | Jinjing Shi, Ronghua Shi, Yin Li, Ye Kang, Xiaoqi Peng. Quantum states sharing in the relay system with teleportation of non-maximally entanglement |
150 | -- | 157 | Yong Yan Chen, Hong Chun Shu. The algorithm model for cumulative vulnerability risk assessment |