1 | -- | 21 | Chi-Sheng Shih, Wei-Yu Hsieh, Chia-Lung Kao. Traceability for Vehicular Network Real-Time Messaging Based on Blockchain Technology |
22 | -- | 30 | Minjae Park, Geunha You, Seong Je Cho, Minkyu Park, Sangchul Han. A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning |
31 | -- | 45 | Jui-Chun Liu, Yi-Quan Ke, Yi-Chih Kao, Shi-Chun Tsai, Yi-Bing Lin. A Dual-Stack Authentication Mechanism Through SNMP |
46 | -- | 67 | Aram Kim, Junhyoung Oh, Jinho Ryu, Jemin Lee, Kookheui Kwon, Kyungho Lee. SoK: A Systematic Review of Insider Threat Detection |
68 | -- | 87 | Yang Wang, Willy Susilo, Joonsang Baek, Jongkil Kim, Intae Kim. Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator |
88 | -- | 108 | Gwangbae Choi, Serge Vaudenay. Timed-Release Encryption With Master Time Bound Key (Extended) |
109 | -- | 125 | Maxim Kolomeets, Amira Benachour, Didier El Baz, Andrey Chechulin, Martin Strecker, Igor V. Kotenko. Reference architecture for social networks graph analysis |