551 | -- | 560 | Yu Chen, Jiang-Yi Lin, Chin-Chen Chang 0001, Yu-Chen Hu. Sharing a Secret Image in the Cloud Using Two Shadows |
561 | -- | 568 | Hui Guo, Lunzhi Deng. An Identity Based Proxy Signcryption Scheme without Pairings |
569 | -- | 574 | Shuang-Gen Liu, Shi-Mei Lu, Rui-Wen Gong. Fast Scalar Multiplication Algorithm Based on Co_Z Operations on Elliptic Curves over GF(3^m) |
575 | -- | 583 | Chin-Chen Chang 0001, Jun-Yong Chen, Yan-Hong Chen, Yanjun Liu 0002. A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding |
584 | -- | 588 | Cai-xue Zhou. Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System |
589 | -- | 596 | Zhi-Ge He. Multi-Parameter and Time Series Based Trust for IoT Smart Sensors |
597 | -- | 601 | Qingfeng Cheng, Yuting Li, Qi Jiang 0001, Xiong Li. Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols |
602 | -- | 609 | Alain Bertrand Bomgni, Garrik Brel Jagho Mdemaya. An Energy-Efficient Protocol Based on Semi-Random Deployment Algorithm in Wireless Sensors Networks |
610 | -- | 620 | Xiaolin Chen, Zhixiong Chen, Huaning Liu. A Family of Pseudorandom Binary Sequences Derived from Generalized Syclotomic Classes Modulo p^{m+1}q^{n+1} |
621 | -- | 626 | Tianhong Yang. Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography |
627 | -- | 637 | Changguang Wang, Zimeng Dai, Dongmei Zhao, Fangwei Wang. A Novel Identity-based Authentication Scheme for IoV Security |
638 | -- | 644 | Jannatul Ferdous, Md. Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Md. Abdul Aziz, Pabel Miah. A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms |
645 | -- | 654 | Fuxiao Zhou, Yanping Li, Changlu Lin. A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security |
655 | -- | 663 | Pengshou Xie, Guoqiang Ma, Tao Feng, Yan Yan, Xue-Ming Han. Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles |
664 | -- | 671 | Yongshuang Wei, Jianhua Chen. Tripartite Authentication Protocol RFID/NFC Based on ECC |
672 | -- | 680 | Cungang Yang, Celia Li. Secure Sharing of Data for Dynamic Group in Public Cloud |
681 | -- | 685 | Zhengjun Cao, Xiqi Wang, Lihua Liu. A Note on One Popular Non-Interactive Zero-Knowledge Proof System |
686 | -- | 697 | Linfan Wang, Yonghong Chen. A Perceptual Hash-based Approach to Detect Covert Timing Channels |
698 | -- | 707 | Yinghui Zhang 0002, Xinwei Ma, Axin Wu, Fangyuan Ren, Dong Zheng 0001. An Efficient Mobile Location-based Service Framework for Resource-constrained Devices |
708 | -- | 716 | Yi-Hui Chen, Li-Chin Huang, Iuon-Chang Lin, Min-Shiang Hwang. Research on the Secure Financial Surveillance Blockchain Systems |