1 | -- | 22 | Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan. A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers |
23 | -- | 38 | Tomotaka Kimura, Chinthaka Premachandra. Optimal Relay Node Selection in Two-Hop Routing for Intermittently Connected MANETs |
39 | -- | 57 | Chika Eze, Jason R. C. Nurse, Jassim Happa. Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices |
58 | -- | 78 | Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, Igor V. Kotenko. Technique of Data Visualization: Example of Network Topology Display for Security Monitoring |
79 | -- | 96 | Bharat K. Bhargava, Amber M. Johnson, Gisele Izera Munyengabe, Pelin Angin. A Systematic Approach for Attack Analysis and Mitigation in V2V Networks |
97 | -- | 117 | William Casey, Jose Andre Morales, Bud Mishra. Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based Model |