1005 | -- | 1015 | Abdelrahman Desoky. Uniform Resource Locator Based Steganography Methodology |
1016 | -- | 1021 | Jialiang Zhang. Application of Artificial Intelligence Technology in Computer Network Security |
1022 | -- | 1032 | Govand Kadir, Ihsan Alshahib Lami. Detection and Isolation of Wormholes in Mobile Ad-hoc Networks Using Localization Information |
1033 | -- | 1041 | Jian-Hua Huang, Liang-Jie Chen, Fan-Chao Li, Ze Fang. Security Quantification Method for Intrusion Tolerance Systems Based on Multi-recovery |
1042 | -- | 1052 | Mahesh Gangarde, Janardhan Chitode, Shruti Oza. Application of Video Watermarking Using Subdivision Technique to Enhance Information Security |
1053 | -- | 1060 | Osama A. Khashan, Nour Mahmoud Khafajah. Secure Stored Images Using Transparent Crypto Filter Driver |
1061 | -- | 1073 | Yongliang Zhao, Quan Qian. Android Malware Identification Through Visual Exploration of Disambly Files |
1074 | -- | 1084 | Hua Ma, Xiaoyu Han, Ting Peng, Linchao Zhang. Secure and Efficient Cloud Data Deduplication Supporting Dynamic Data Public Auditing |
1085 | -- | 1092 | V. Sangeetha, S. Swapna Kumar. Probabilistic Framework for Assessing the Threat Level using Novel Decision Constructs in Mobile Adhoc Network |
1093 | -- | 1104 | Animesh Hazra, Soumya Ghosh, Sampad Jash. A Review on DNA Based Cryptographic Techniques |
1105 | -- | 1114 | Chunhu Li, Guangchun Luo, Chunbao Li. A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map |
1115 | -- | 1124 | V. Preetha, K. Chitra. ZBMRP: Zone Based MANET Routing Protocol with Genetic Algorithm and Security Enhancement Using Neural Network Learning |
1125 | -- | 1136 | Lili Yao, Jiabing Liu, Dejun Wang, Jing Li, Bo Meng. Formal Analysis of SDN Authentication Protocol with Mechanized Protocol Verifier in the Symbolic Model |
1137 | -- | 1148 | Xiuxia Tian, Qian Song, Fuliang Tian. Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy |
1149 | -- | 1162 | Kittur P. Kibiwott, Fengli Zhang, Anyembe Andrew Omala, Daniel Adu-Gyamfi. Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE |
1163 | -- | 1174 | Eman Tarek, Osama Ouda, Ahmed Atwan. Image-based Multimodal Biometric Authentication Using Double Random Phase Encoding |
1175 | -- | 1182 | Ledi Fang, Shundong Li, Wenli Wang. An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines |
1183 | -- | 1193 | Caixue Zhou, Yue Zhang, Lingmin Wang. A Provable Secure Identity-based Generalized Proxy Signcryption Scheme |
1194 | -- | 1199 | Wenjie Yang, Min-Rong Chen, Guo-Qiang Zeng. Cryptanalysis of Two Strongly Unforgeable Identity-based Signatures in the Standard Model |
1200 | -- | 1205 | Lin Teng, Hang Li. A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping |
1206 | -- | 1214 | Kamsiah Mohamed, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin, Nur Hafiza Zakaria, Mohd Nazran Mohammed Pauzi. An Improved AES S-box Based on Fibonacci Numbers and Prime Factor |
1215 | -- | 1220 | Yun Zhang. Research on the Security Protection of E-Commerce Information under the Background of Mobile Consumption |
1221 | -- | 1226 | Li-Chin Huang, Ting Yi Chang, Min-Shiang Hwang. A Conference Key Scheme Based on the Diffie-Hellman Key Exchange |
1227 | -- | 1233 | Lei Zhang. Supervision and Investigation of Internet Fraud Crimes |