1 | -- | 11 | Kuo-Kun Tseng, Xialong He, Xiaoxiao An, Chin-Chen Chang, Chao Wang, Xiangmin Guo. Packet Watermarking With ECG Biological Feature |
12 | -- | 23 | Jia-Qi Wang, Yun-Feng Zhang, Dao-wei Liu. Provable Secure for the Ultra-lightweight RFID Tag Ownership Transfer Protocol in the Context of IoT Commerce |
24 | -- | 35 | Hua Ma, Guohua Tian, Linchao Zhang. Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing |
36 | -- | 40 | Lihua Liu, Yang Li, Zhengjun Cao, Zhen Chen. A Note On One Secure Data Self-Destructing Scheme In Cloud Computing |
41 | -- | 53 | Shahrzad Sedaghat. The Forensics of DDoS Attacks in the Fifth Generation Mobile Networks Based on Software-Defined Networks |
54 | -- | 67 | Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, Yan Xiong. A Formal Framework of Shielding Systems by Stepwise Refinement |
68 | -- | 79 | Hui Tian 0002, Zhao-Hua Zhu, Chin-Chen Chang 0001, Yongfeng Huang, Tian Wang 0001, Yonghong Chen, Yiqiao Cai. StegoNote: Steganography in Guitar Music Using Note Modulation |
80 | -- | 92 | Jintian Lu, Xudong He, Yitong Yang, Dejun Wang, Bo Meng. Automatic Verification of Security of Identity Federation Security Protocol Based on SAML2.0 with ProVerif in the Symbolic Model |
93 | -- | 101 | Budi Gunawan, Barito Mulyo Ratmono. Social Media, Cyberhoaxes and National Security: Threats and Protection in Indonesian Cyberspace |
102 | -- | 111 | Hui Guo, Lunzhi Deng. Certificateless Ring Signcryption Scheme from Pairings |
112 | -- | 117 | Lin Teng, Hang Li, Shoulin Yin, Yang Sun. A Modified Advanced Encryption Standard for Data Security |
118 | -- | 125 | Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon. Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey |
126 | -- | 135 | Xiaofeng Chen, Wenlong Guo. Reversible Data Hiding Scheme Based on Fully Exploiting The Orientation Combinations of Dual Stego-images |
136 | -- | 144 | Ying-Chih Tseng, Heng Ma. A Multibit Representation of Bloom Filter for Simultaneous Acquisition of Membership and Attribute Information |
145 | -- | 149 | Jing Chen, Feng Zhao 0002, Haiyan Xing. Research on Security of Mobile Communication Information Transmission Based on Heterogeneous Network |
150 | -- | 154 | Shidong Zhang, Tongjiang Yan, Yuhua Sun, Lianhai Wang. Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation |
155 | -- | 160 | Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, Yang Sun. An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain |
161 | -- | 170 | Kang Yang, Guohua Wu, Chengcheng Dong, Xingbing Fu, Fagen Li, Ting Wu. Attribute Based Encryption with Efficient Revocation from Lattices |
171 | -- | 176 | Zepeng Zhuo, Jinfeng Chong, Lei Yu. Correlation Functions of m-Sequences of Different Lengths |
177 | -- | 182 | Xiaoyi Hong. Network Security Situation Prediction Based on Grey Relational Analysis and Support Vector Machine Algorithm |