103 | -- | 109 | Zhengjun Cao, Hanyue Cao. Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme |
110 | -- | 122 | Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi. Revocable Identity-based Signcryption Scheme Without Random Oracles |
123 | -- | 128 | Bin Feng, Cheng Guo, MingChu Li, Zhi-Hui Wang. A Novel Proactive Multi-secret Sharing Scheme |
129 | -- | 134 | Ji Geng, Hu Xiong, Zhiguang Qin, Fagen Li. On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing |
135 | -- | 141 | Yuan Huang, Shengke Zeng, Xingwei Liu. Privacy-preserving Communication for VANETs with Conditionally Anonymous Ring Signature |
142 | -- | 149 | Xingbing Fu. Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes |
150 | -- | 159 | Patrick G. Clark, Arvin Agah. Firewall Policy Diagram: Structures for Firewall Behavior Comprehension |
160 | -- | 164 | Heri Wijayanto, Min-Shiang Hwang. Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance |
165 | -- | 173 | Cheng Guo, Chin-Chen Chang. A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem |
174 | -- | 188 | Shengyi Pan, Thomas H. Morris, Uttam Adhikari. A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System |
189 | -- | 198 | Jan-Min Chen. An Auto-tuning Sanitizing System for Mitigating Injection Flaws |
199 | -- | 207 | Feng Wang, Chin-Chen Chang, Yeh-Chieh Chou. Group Authentication and Group Key Distribution for Ad Hoc Networks |
208 | -- | 216 | Degang Xu, Zhao Wu, Zhongbo Wu, Qilin Zhang, Leihua Qin, Jingli Zhou. Internet of Things: Hotspot-based Discovery Service Architecture with Security Mechanism |
217 | -- | 223 | Yi Zhao, Qiliang Yang, Bo Yang. Provably Secure Partially Blind Signature Scheme Based on Quadratic Residue |
224 | -- | 228 | Hu Xiong, Ji Geng, Zhiguang Qin, Guobin Zhu. Cryptanalysis of Attribute-based Ring Signcryption Scheme |