167 | -- | 176 | Omprakash Kaiwartya, Mukesh Prasad, Shiv Prakash, Durgesh Samadhiya, Abdul Hanan Abdullah, andSyed Othmawi Abd Rahman. An Investigation on Biometric Internet Security |
177 | -- | 181 | Chung-Huei Ling, Cheng-Chi Lee, Chou Chen Yang, Min-Shiang Hwang. A Secure and Efficient One-time Password Authentication Scheme for WSN |
182 | -- | 192 | Vrushank M. Shah, A. K. Agarwal. Reliable Alert Fusion of Multiple Intrusion Detection Systems |
193 | -- | 204 | Jayam Modi, Manav Prajapati, Abhinav Sharma, Ravi Ojha, Devesh Jinwala. A Secure Communication Model for Expressive Access Control Using CP-ABE |
205 | -- | 216 | Qian Mao, Chin-Chen Chang. Turbo Unequal Error Protection Codes with Multiple Protection Levels |
217 | -- | 228 | Yang Sun, Xueshuai Feng, Hongfeng Zhu. Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications |
229 | -- | 235 | Lunzhi Deng, Huawei Huang, Yunyun Qu. Identity Based Proxy Signature from RSA without Pairings |
236 | -- | 243 | Junshe Wang, Jinliang Liu, Hongbin Zhang. Access Control Based Resource Allocation in Cloud Computing Environment |
244 | -- | 250 | Abdulghani Ali Ahmed, Noorul Ahlami Kamarul Zaman. Attack Intention Recognition: A Review |
251 | -- | 259 | Dipen Contractor, Dhiren R. Patel. Accountability in Cloud Computing by Means of Chain of Trust |
260 | -- | 271 | Lifeng Yuan, MingChu Li, Cheng Guo, Wei-Tong Hu, Zhi-Hui Wang. A Verifiable E-voting Scheme with Secret Sharing |
272 | -- | 284 | Hua Ma, Ting Peng, Zhenhua Liu. Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe |
285 | -- | 294 | Cai-Sen Chen, Xi Yu, Yang-Xia Xiang, Xiong Li, Tengrun Li. An Improved DPA Attack on DES with Forth and Back Random Round Algorithm |
295 | -- | 312 | Maged Hamada Ibrahim. SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem |
313 | -- | 322 | Xingbing Fu, Xunyun Nie, Fagen Li. Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map |
323 | -- | 326 | Zhengjun Cao, Lihua Liu. A Note on Two Schemes for Secure Outsourcing of Linear Programming |