806 | -- | 813 | Hong Cheng, Jeffrey Xu Yu. Clustering Large Attributed Graph |
814 | -- | 822 | RyƓichi Sasaki. Considerations on Risk Communication for IT Systems and Development of Support Systems |
823 | -- | 0 | Satoru Torii. Editor's Message to Special Issue on Computer Security Technology Achieving Smart Society |
824 | -- | 834 | Terry Benzel, John Wroclawski. The DETER Project: Towards Structural Advances in Experimental Cybersecurity Research and Evaluation |
835 | -- | 845 | Takahiro Kasama, Katsunari Yoshioka, Tsutomu Matsumoto, Masaya Yamagata, Masashi Eto, Daisuke Inoue, Koji Nakao. Malware Sandbox Analysis with Efficient Observation of Herder's Behavior |
846 | -- | 853 | Ruan Na, Takashi Nishide, Yoshiaki Hori. Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs |
854 | -- | 860 | Hidenori Kuwakado. Length-preserving CBC Enciphering Scheme and Its Security Analysis |
861 | -- | 870 | Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura. Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation |
871 | -- | 882 | Isao Goto, Masao Utiyama, Takashi Onishi, Eiichiro Sumita. An Empirical Comparison of Parsers in Constraining Reordering for E-J Patent Machine Translation |