| 1 | -- | 17 | K. Nalini Sujantha Bel, I. Shatheesh Sam. OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing |
| 19 | -- | 27 | Vahid Meraji, Hadi Soleimany. Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets |
| 29 | -- | 45 | Nastaran Shekofte, Siavash Bayat Sarmadi, Hatameh Mosanaei-Boorani. A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration |
| 47 | -- | 57 | Mansoureh Labbafniya, Shahram Etemadi Borujeni, Roghayeh Saeidi. Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing |
| 59 | -- | 72 | Salome James, Thumbur Gowri, Punugu Vasudeva Reddy. An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery |
| 73 | -- | 85 | Vahid Chegeni, Hamid Haj Seyyed Javadi, Mohammad Reza Moazami Goudarzi, Afshin Rezakhani. Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case |