1 | -- | 26 | Asem Kitana, Issa Traoré, Isaac Woungang. Impact Study of a Mobile Botnet over LTE Networks |
27 | -- | 39 | Geonbae Na, Jongsu Lim, Kyoungmin Kim, Jeong Hyun Yi. Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART |
40 | -- | 60 | Siamak Aram, Rouzbeh A. Shirvani, Eros Pasero, Mohamed F. Chouikha. Implantable Medical Devices; Networking Security Survey |
61 | -- | 113 | Tapas Pandit, Sumit Kumar Pandey, Rana Barua. Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version) |