601 | -- | 608 | Arun Malik, Babita Pandey. Security Analysis of Discrete Event Based Threat Driven Authentication Approach in VANET Using Petri Nets |
609 | -- | 616 | Bei Xie, Jiaohua Qin, Xuyu Xiang, Hao Li, Lili Pan. An Image Retrieval Algorithm Based on Gist and Sift Features |
617 | -- | 624 | Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, T. Yerri Swamy. Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices |
625 | -- | 635 | Dindayal Mahto, Dilip Kumar Yadav. Performance Analysis of RSA and Elliptic Curve Cryptography |
636 | -- | 644 | Mourad Abdeljebbar, Rachid El Kouch. Security Improvements of EPS-AKA Protocol |
645 | -- | 654 | Yasir Hamid, Veeran Ranganathan Balasaraswathi, Ludovic Journaux, Muthukumarasamy Sugumaran. Benchmark Datasets for Network Intrusion Detection: A Review |
655 | -- | 663 | Fadi Al-Ayed, Chunqiang Hu, Hang Liu. An Efficient Practice of Privacy Implementation: Kerberos and Markov Chain to Secure File Transfer Sessions |
664 | -- | 673 | Ming Yang, Rong Jiang, Tilei Gao, Wanyu Xie, Jia Wang. Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain |
674 | -- | 682 | Xu Wu. Study on Trust Model for Multi-users in Cloud Computing |
683 | -- | 688 | Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang. Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
689 | -- | 701 | Divyashikha Sethia, Huzur Saran, Daya Gupta. CP-ABE for Selective Access with Scalable Revocation: A Case Study for Mobile-based Healthfolder |
702 | -- | 709 | Prakash G. L, Manish Prateek, Inder Singh. Data Verification Using Block Level Batch Auditing on Multi-cloud Server |
710 | -- | 720 | Tao Feng, Jiaqi Guo. A New Access Control System Based on CP-ABE in Named Data Networking |
721 | -- | 729 | Shaila Ghanti, G. M. Naik. Defense Techniques of SYN Flood Attack Characterization and Comparisons |
730 | -- | 737 | K. Murugan, P. Suresh. Efficient Anomaly Intrusion Detection Using Hybrid Probabilistic Techniques in Wireless Ad Hoc Network |
738 | -- | 745 | K. Veena, K. Meena. Identification of Cyber Criminal by Analysing the Users Profile |
746 | -- | 753 | V. S. Janani, M. S. K. Manikandan. An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks |
754 | -- | 761 | Yunfa Li, Yangyang Shen, Mingyi Li. A Credible Mechanism of Service about Data Resource in Cloud Computing |
762 | -- | 773 | Ke Gu, Linyu Wang, Na Wu, Niandong Liao. Traceable Certificateless Ring Signature Scheme For No Full Anonymous Applications |
774 | -- | 787 | Kazi Md. Rokibul Alam, Adnan Maruf, Md. Rezaur Rahman Rakib, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto. An Untraceable Voting Scheme Based on Pairs of Signatures |
788 | -- | 800 | Youssef Harmouch, Rachid Elkouch, Hussain Ben-Azza. Multiple New Formulas for Cipher Performance Computing |
801 | -- | 804 | Yu-Lun Wang, Jau-Ji Shen, Min-Shiang Hwang. A Novel Dual Image-based High Payload Reversible Hiding Technique Using LSB Matching |
805 | -- | 810 | Cen Zuo. Defense of Computer Network Viruses Based on Data Mining Technology |