154 | -- | 157 | Yong Yu 0002, Yi Mu 0001. Advances of Provable Security Techniques |
158 | -- | 181 | Yuan Chen, Qingkuan Dong, Yannan Li, Qiqi Lai, Zhedong Wang. Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms |
182 | -- | 202 | Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin. Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption |
203 | -- | 221 | Xiaoling Tao, Liyan Liu, Feng Zhao, Yan Huang, Saide Zhu, Yi Liang. Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method |
222 | -- | 244 | Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen 0001. Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption |
245 | -- | 269 | Meijuan Huang, Bo Yang 0003, Yi Zhao, Kaitai Liang, Liang Xue, Xiaoyi Yang. CCA-Secure Deterministic Identity-Based Encryption Scheme |
270 | -- | 281 | Xiuze Dong, Yunchuan Guo, FengHua Li, Liju Dong, Arshad Khan. Combination Model of Heterogeneous Data for Security Measurement |
282 | -- | 293 | Xianmin Wang, Yu Zhang, Brij Bhooshan Gupta, Hongfei Zhu, Dongxi Liu. An Identity-Based Signcryption on Lattice without Trapdoor |
294 | -- | 308 | Bagus Santoso, Chunhua Su. A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries |