601 | -- | 607 | Lu Xiao, Gregory G. Rose. Attacks on a lightweight cipher based on a multiple recursive generator |
608 | -- | 621 | Georgios Androulidakis, Symeon Papavassiliou. Two-stage selective sampling for anomaly detection: analysis and evaluation |
622 | -- | 632 | Xia Yin, Zhiliang Wang, Chuanming Jing, Jianping Wu. A formal approach to robustness testing of network protocol with time constraints |
633 | -- | 650 | Divya Muthukumaran, Joshua Schiffman, Mohamed Hassan, Anuj Sawani, Vikhyath Rao, Trent Jaeger. Protecting the integrity of trusted applications in mobile phone systems |
651 | -- | 665 | Ahmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri. A formal model of trust for calculating the quality of X.509 certificate |
666 | -- | 677 | Sudip Misra, P. Venkata Krishna, Kiran Isaac Abraham. A stochastic learning automata-based solution for intrusion detection in vehicular ::::ad hoc:::: networks |
678 | -- | 684 | Xiaodong Lin. A provably secure threshold signature scheme based on DDH assumption |
685 | -- | 696 | Wen Gu, Pramode K. Verma, Stamatios V. Kartalopoulos. A unified security framework for WiMAX over EPON access networks |
697 | -- | 718 | Abdelrahman Desoky. Matlist: Mature linguistic steganography methodology |
719 | -- | 726 | Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, Thomas F. La Porta. From mobile phones to responsible devices |