863 | -- | 869 | Jong-Shin Chen, Cheng-Ying Yang, Min-Shiang Hwang. The Capacity Analysis in the Secure Cooperative Communication System |
870 | -- | 879 | Mourade Azrour, Yousef Farhaoui, Mohammed Ouanan. A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card |
880 | -- | 888 | Rui-Hong Dong, Dong-Fang Wu, Qiu-yu Zhang. The Integrated Artificial Immune Intrusion Detection Model Based on Decision-theoretic Rough Set |
889 | -- | 898 | Zakariae Tbatou, Ahmed Asimi, Younes Asimi, Yassine Sadqi, Azidine Guezzaz. A New Mutuel Kerberos Authentication Protocol for Distributed Systems |
899 | -- | 903 | Yuwei Xu, Chuankun Wu. Further Characterization of H Vectorial Functions |
904 | -- | 911 | Guifa Hou, Zhijie Wang. A Robust and Efficient Remote Authentication Scheme from Elliptic Curve Cryptosystem |
912 | -- | 921 | Arup Kumar Chattopadhyay, Amitava Nag, Koushik Majumder. Secure Data Outsourcing on Cloud Using Secret Sharing Scheme |
922 | -- | 928 | I-Chun Weng, Tzung-Her Chen. A Novel Weighted Visual Cryptography Scheme with High Visual Quality |
929 | -- | 939 | Ram Charan Baishya, Nozrul Hoque, Dhruba Kumar Bhattacharyya. DDoS Attack Detection Using Unique Source IP Deviation |
940 | -- | 949 | Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin. An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet |
950 | -- | 954 | Zhengjun Cao, Lihua Liu, Olivier Markowitch. Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates |
955 | -- | 965 | Safi Ibrahim, Mohamed Hamdy, Eman Shaaban. Towards an Optimum Authentication Service Allocation and Availability in VANETs |
966 | -- | 972 | Ming Luo, Yuwei Wan, Donghua Huang. Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security |
973 | -- | 983 | Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, Hu Xiong. Revocable ABE with Bounded Ciphertext in Cloud Computing |
984 | -- | 994 | M. Y. Mohamed Parvees, J. Abdul Samath, B. Parameswaran Bose. Protecting Large Size Medical Images with Logistic Map Using Dynamic Parameters and Key Image |
995 | -- | 1004 | Rui Guo, Huixian Shi. Confidentiality-Preserving Personal Health Records in Tele-Healthcare System Using Authenticated Certificateless Encryption |
1005 | -- | 1015 | Hang Gao, Mengting Hu, Tiegang Gao, Renhong Cheng. Double Verifiable Lossless Secret Sharing Based on Hyper-chaos Generated Random Grid |
1016 | -- | 1023 | Jianjun Zhang, Huajun Huang, Lucai Wang, HaiJun Lin, Deng Gao. Coverless Text Information Hiding Method Using the Frequent Words Hash |
1024 | -- | 1035 | Kavitha R, Padmavathi G. Advanced Random Time Queue Blocking for Effective Protection of Application Servers Against Low-Rate DoS Attacks |
1036 | -- | 1043 | Zhi-yong Luo, Bo You, Peng Wang, Jie Su, Yi Liang. Analysis and Optimization of System Intrusion Tolerance Capacity Based on Markov |
1044 | -- | 1052 | Yang Zhao, Pengcheng Fan, Haoting Cai, Zhiguang Qin, Hu Xiong. Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare |
1053 | -- | 1061 | Jongho Moon, Donghoon Lee, Jaewook Jung, Dongho Won. Improvement of Efficient and Secure Smart Card Based Password Authentication Scheme |
1062 | -- | 1071 | Sang Ni, Mengbo Xie, Quan Qian. Clustering Based K-anonymity Algorithm for Privacy Preservation |
1072 | -- | 1079 | Fang Ren, Dong Zheng, Weijing Wang. An Efficient Code Based Digital Signature Algorithm |