301 | -- | 309 | Li-Chin Huang, Lin Yu Tseng, Min-Shiang Hwang. The Study of Data Hiding in Medical Images |
310 | -- | 315 | Miaomiao Tian, Liusheng Huang, Wei Yang. A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model |
316 | -- | 319 | Kalyan Chakraborty, Jay Mehta. A Stamped Blind Signature Scheme based on Elliptic Curve Discrete Logarithm Problem |
320 | -- | 323 | Miaomiao Tian, Liusheng Huang. Breaking A Proxy Signature Scheme From Lattices |
324 | -- | 338 | Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik. Harvesting SSL Certificate Data to Identify Web-Fraud |
339 | -- | 351 | Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita. AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach |
352 | -- | 361 | Farzaneh Geramiraz, Amir Saman Memaripour, Maghsoud Abbaspour. Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller |
362 | -- | 365 | Miaomiao Tian, Wei Yang, Liusheng Huang. Security of a Biometric Identity-based Encryption Scheme |