717 | -- | 727 | Li-Chin Huang, Chun-Hsien Chang, Min-Shiang Hwang. Research on Malware Detection and Classification Based on Artificial Intelligence |
728 | -- | 735 | Fei Tang, Dong Huang. A BLS Signature Scheme from Multilinear Maps |
736 | -- | 742 | Changsong Jiang, Yuhua Sun, Xueting Liang. Eighth Power Residue Double Circulant Self-Dual Codes |
743 | -- | 751 | Seth Alornyo, Acheampong Edward Mensah, Abraham Opanfo Abbam. Identity-based Public Key Cryptographic Primitive with Delegated Equality Test Against Insider Attack in Cloud Computing |
752 | -- | 762 | Yanjun Liu 0002, Chin-Chen Chang, Peng-Cheng Huang. One-Code-Pass User Authentication Based on QR Code and Secret Sharing |
763 | -- | 774 | Xiaoxu Gao, Leyou Zhang. Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience |
775 | -- | 781 | Lin Mei, Fengli Zhang. A Distributed Density-based Outlier Detection Algorithm on Big Data |
782 | -- | 792 | Jinyue Bian, Quan Qian. Binary Executable Files Homology Detection with Genetic Algorithm |
793 | -- | 800 | L. Mancy, S. Maria Celestin Vigila. A New Diffusion and Substitution-based Cryptosystem for Securing Medical Image Applications |
801 | -- | 808 | Shanshan Zhang. A LWE-based Oblivious Transfer Protocol from Indistinguishability Obfuscation |
809 | -- | 814 | Haiou Yang, Youliang Tian. Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique |
815 | -- | 827 | Li Kang, Leyou Zhang. A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme |
828 | -- | 837 | Ming-Sang Chang, Chih Ping Yen. Evidence Gathering of Facebook Messenger on Android |
838 | -- | 844 | Jian Liu, Feilong Qin. Protection of User Data by Differential Privacy Algorithms |
845 | -- | 856 | Zhenhua Liu, Yan Liu, Jing Xu 0022, Baocang Wang. Verifiable Attribute-based Keyword Search Encryption with Attribute Revocation for Electronic Health Record System |
857 | -- | 862 | Bin Wang. An Unlinkable Key Update Scheme Based on Bloom Filters for Random Key Pre-distribution |
863 | -- | 868 | P. R. Ancy, Addapalli V. N. Krishna, K. Balachandran, M. Balamurugan, O. S. GnanaPrakasi. Survey on Attribute-based Encryption in Cloud Computing |
869 | -- | 873 | Shoulin Yin, Jie Liu 0039, Lin Teng. A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence |
874 | -- | 884 | Chencheng Hu, Dong Zheng 0001, Rui Guo 0005, Axin Wu, Liang Wang, Shiyao Gao. A Novel Blockchain-based Anonymous Handover Authentication Scheme in Mobile Networks |
885 | -- | 896 | Changsong Yang, Xiaoling Tao, Qiyu Chen. New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage |