401 | -- | 409 | Hongfeng Zhu, Yan Zhang, Xiaodan Wang. A Novel One-Time Identity-Password Authenticated Scheme Based on Biometrics for E-coupon System |
410 | -- | 419 | Fan Li, Qian Mao, Chin-Chen Chang. A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method |
420 | -- | 432 | Mehdi Hosseinzadeh Aghdam, Peyman Kabiri. Feature Selection for Intrusion Detection System Using Ant Colony Optimization |
433 | -- | 444 | Suchart Khummanee, Kitt Tientanopajai. The Policy Mapping Algorithm for High-speed Firewall Policy Verifying |
445 | -- | 453 | Younes Asimi, Abdallah Amghar, Ahmed Asimi, Yassine Sadqi. New Random Generator of a Safe Cryptographic Salt Per Session |
454 | -- | 458 | Feng Wang, Chin-Chen Chang, Changlu Lin. Security Analysis on Secure Untraceable Off-line Electronic Cash System |
459 | -- | 473 | Anthéa Mayzaud, Remi Badonnel, Isabelle Chrisment. A Taxonomy of Attacks in RPL-based Internet of Things |
474 | -- | 480 | Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattacharyya, Jugal K. Kalita. Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation |
481 | -- | 486 | Yilei Wang, Wenyi Bao, Yang Zhao, Hu Xiong, Zhiguang Qin. An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment |
487 | -- | 492 | Chenhuang Wu, Xiaoni Du, Zhengtao Jiang. Linear Complexity of a Family of Pseudorandom Discrete Logarithm Threshold Sequences |
493 | -- | 500 | Fangwei Wang, Fang Yang, Changguang Wang, Dongmei Zhao, Yunkai Zhang. Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination |
501 | -- | 513 | Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdullah, Mohammed AlQurashi, Rahmat Budiarto. Penetration Testing and Mitigation of Vulnerabilities Windows Server |
514 | -- | 522 | Alka Chauhary, V. N. Tiwari, Anil Kumar Dahiya. A Novel Intrusion Detection System Based on Soft Computing Techniques Using Neuro- Fuzzy Classifier for Packet Dropping Attack in MANETs |
523 | -- | 528 | Ali Kartit, Hamza Kamal Idrissi, Mohamed Belkhouraf. Improved Methods and Principles for Designing and Analyzing Security Protocols |
529 | -- | 537 | Mohamad Badra, Sherali Zeadally. An Improved Privacy Solution for the Smart Grid |
538 | -- | 543 | Zhengjun Cao, Lihua Liu, Zhenzhen Yan. An Improved Lindell-Waisbard Private Web Search Scheme |
544 | -- | 552 | Xing Zhang, Rongxing Lu, Hong Zhang, Chungen Xu. A New Digital Signature Scheme from Layered Cellular Automata |
553 | -- | 564 | Tanmoy Maitra, Ruhul Amin, Debasis Giri, P. D. Srivastava. An Efficient and Robust User Authentication Scheme for Hierarchical Wireless Sensor Networks without Tamper-Proof Smart Card |
565 | -- | 578 | Chien-Cheng Huang, Kwo-Jean Farn. A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization |
579 | -- | 589 | Govand Kadir, Torben Kuseler, Ihsan Alshahib Lami. SMPR: A Smartphone Based MANET Using Prime Numbers to Enhance the Network-nodes Reachability and Security of Routing Protocols |
590 | -- | 593 | Chung-Huei Ling, Shih-Ming Chen, Min-Shiang Hwang. Cryptanalysis of Tseng-Wu Group Key Exchange Protocol |
594 | -- | 596 | Chin-Yu Sun, Ching-Chun Chang. Cryptanalysis of a Secure and Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems |
597 | -- | 600 | Fuh-Gwo Jeng, Shu-Yuan Lin, Bing-Jian Wang, Chih-Hung Wang, Tzung-Her Chen. On the Security of Privacy-preserving Keyword Searching for Cloud Storage Services |