943 | -- | 957 | Ruo Jun Cai, Xue Jun Li, Peter Han Joo Chong. A novel self-checking ad hoc routing scheme against active black hole attacks |
958 | -- | 965 | Ilija Basicevic, Stanislav Ocovaj, Miroslav Popovic. The value of flow size distribution in entropy-based detection of DoS attacks |
966 | -- | 976 | Liaojun Pang, Deyu Miao, Chunfeng Lian. User-friendly random-grid-based visual secret sharing for general access structures |
977 | -- | 995 | Eric McCary, Yang Xiao. Home area network accountability with varying consumption devices in smart grid |
996 | -- | 1006 | Kunpeng Bai, Chuankun Wu. A secure white-box SM4 implementation |
1007 | -- | 1015 | Hong Zhong, Jie Cui, Runhua Shi, Chao Xia. Many-to-one homomorphic encryption scheme |
1016 | -- | 1024 | Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage |
1025 | -- | 1039 | Bhawana Rudra, Om Prakash Vyas. Investigation of security issues for service-oriented network architecture |
1040 | -- | 1049 | Wenli Shang, Peng Zeng, Ming Wan, Lin Li, Panfeng An. Intrusion detection algorithm based on OCSVM in industrial control system |
1050 | -- | 1071 | Tonko Kovacevic, Toni Perkovic, Mario Cagalj. Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices |
1072 | -- | 1084 | Zohreh Saffarian Eidgahi, Vahid Rafe. Security analysis of network protocols through model checking: a case study on mobile IPv6 |
1085 | -- | 1102 | Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy. Provably secure group key agreement protocol based on ECDH with integrated signature |
1103 | -- | 1118 | Tala Tafazzoli, Babak Sadeghiyan. A stochastic model for the size of worm origin |
1119 | -- | 1131 | Boris Damjanovic, Dejan Simic. Tweakable parallel OFB mode of operation with delayed thread synchronization |
1132 | -- | 1145 | Qussai Yaseen, Qutaibah Althebyan, Brajendra Panda, Yaser Jararweh. Mitigating insider threat in cloud relational databases |
1146 | -- | 1157 | Shuo Chen, Maode Ma, Zhenxing Luo. An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems |
1158 | -- | 1172 | Shaghayegh Bakhtiari Chehelcheshmeh, Mehdi Hosseinzadeh. Quantum-resistance authentication in centralized cognitive radio networks |
1173 | -- | 1185 | Yibin Dai, Shaozhen Chen. Security analysis of Khudra: a lightweight block cipher for FPGAs |
1186 | -- | 1197 | Tzonelih Hwang, Prosanta Gope. PFX: an essence of authencryption for block-cipher security |
1198 | -- | 1215 | Madhusanka Liyanage, Pardeep Kumar, Mika Ylianttila, Andrei V. Gurtov. Novel secure VPN architectures for LTE backhaul networks |
1216 | -- | 1225 | Yilmaz Kaya, Ă–mer Faruk Ertugrul. A novel approach for spam email detection based on shifted binary patterns |
1226 | -- | 1246 | Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Yannis Papaefstathiou. A survey of lightweight stream ciphers for embedded systems |
1247 | -- | 1265 | Yefeng Ruan, Sivapriya Kalyanasundaram, Xukai Zou. Survey of return-oriented programming defense mechanisms |