1271 | -- | 1284 | Yacine Rebahi, Mateusz Khalil, Simon Hohberg, Pascal Lorenz. An Android based new German eID solution for policy making processes |
1285 | -- | 1296 | Unal Cavusoglu, Akif Akgul, Sezgin Kaçar, Ihsan Pehlivan, Ahmet Zengin. A novel chaos-based encryption algorithm over TCP data packet for secure communication |
1297 | -- | 1308 | Eunsoo Seo, Gulustan Dogan, Tarek F. Abdelzaher, Theodore Brown. Root cause diagnosis in error-propagating networks |
1309 | -- | 1320 | Hui Zhu, Xiaoxia Liu, Rongxing Lu, Hui Li. EPCS: an efficient and privacy-preserving classification service query framework for SVM |
1321 | -- | 1330 | Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang. Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture |
1331 | -- | 1339 | Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang. Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment |
1340 | -- | 1352 | MingChu Li, Xiaodong Xu, Cheng Guo, Xing Tan. AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement |
1353 | -- | 1358 | Liangliang Wang, Kefei Chen, Yu Long, Huige Wang. Cryptanalysis of a certificateless aggregate signature scheme |
1359 | -- | 1373 | Ziwen Sun, Yao Wang, Gang Qu, Zhiping Zhou. A 3-D hand gesture signature based biometric authentication system for smartphones |
1374 | -- | 1383 | Kamal Adli Mehr, Javad Musevi Niya. Security bootstrapping of mobile ad hoc networks using identity-based cryptography |
1384 | -- | 1397 | Zuowen Tan. A privacy-preserving multi-server authenticated key-agreement scheme based on Chebyshev chaotic maps |
1398 | -- | 1404 | Nan Run Zhou, Xiao Rong Liang, Zhihong Zhou, Ahmed Farouk. Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise |
1405 | -- | 1416 | Hai-Cheng Chu, Han-Chieh Chao. Testifying the digital artifacts for line application program under Mac OS X from the aspects of witness experts |
1417 | -- | 1434 | Shifeng Sun, Dawu Gu, Shengli Liu. Efficient chosen ciphertext secure identity-based encryption against key leakage attacks |
1435 | -- | 1449 | Junfeng Yu, Qingfeng Huang, Chee Hoo Yian. DroidScreening: a practical framework for real-world Android malware analysis |
1450 | -- | 1461 | Ahmad M. Manasrah, Basim Najim Al-Din. Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study |
1462 | -- | 1476 | Dongwoo Kang, Jaewook Jung, Jongho Mun, Donghoon Lee, Younsung Choi, Dongho Won. Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain |
1477 | -- | 1495 | Shashank Gupta, B. B. Gupta. JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities |
1496 | -- | 1508 | Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian. Thwarting location privacy protection in location-based social discovery services |
1509 | -- | 1519 | Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai. JitterBug covert timing channel with sparse embedding |
1520 | -- | 1534 | Yao Wang, Wan-Dong Cai, Pengcheng Wei. A deep learning approach for detecting malicious JavaScript code |
1535 | -- | 1546 | Ismail San, Nuray At, Ibrahim Yakut, Huseyin Polat. Efficient paillier cryptoprocessor for privacy-preserving data mining |
1547 | -- | 1552 | Hui Zhang. Insecurity of a certificateless aggregate signature scheme |
1553 | -- | 1576 | Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa, Toqeer Ali Syed. TSSDroid: realization of an efficient and usable TSS API for the Android software stack |
1577 | -- | 1588 | Hsiao-Ling Wu, Chin-Chen Chang, Chin-Yu Sun. A secure authentication scheme with provable correctness for pay-TV systems |
1589 | -- | 1612 | Sumit Kumar Debnath, Ratna Dutta. Towards fair mutual private set intersection with linear complexity |
1613 | -- | 1629 | Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou, Qiuliang Xu. Public-key encryption with keyword search secure against continual memory attacks |