2245 | -- | 2260 | Fatemeh Faraji Daneshgar, Maghsoud Abbaspour. Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework |
2261 | -- | 2275 | Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler. Outsourcing secure two-party computation as a black box |
2276 | -- | 2290 | Chun-Ta Li. A secure chaotic maps-based privacy-protection scheme for multi-server environments |
2291 | -- | 2301 | Hongyuan Wang, Liehuang Zhu, Chang Xu, Yijia Lilong. A universal method for realizing non-repudiable provable data possession in cloud storage |
2302 | -- | 2312 | Peixin Chen, Jinshu Su, BaoKang Zhao, Xiaofeng Wang, Ilsun You. An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing |
2313 | -- | 2322 | Qilong Han, Bo Shao, Lijie Li, Zhiqiang Ma, Haitao Zhang, Xiaojiang Du. Publishing histograms with outliers under data differential privacy |
2323 | -- | 2337 | Adrián Sánchez-Carmona, Sergi Robles, Carlos Borrego. Identity-based access control for pro-active message's DTN |
2338 | -- | 2347 | Dinhtu Truong, Guang Cheng. Detecting domain-flux botnet based on DNS traffic features in managed network |
2348 | -- | 2358 | Hee-Sun Won, Sang-Pil Kim, Sanghun Lee, Mi-Jung Choi, Yang-Sae Moon. Secure principal component analysis in multiple distributed nodes |
2359 | -- | 2370 | Yuwen Qian, Ting Sun, Jun Li, Chang Fan, Hua-ju Song. Design and analysis of the covert channel implemented by behaviors of network users |
2371 | -- | 2386 | Ming Li, Di Xiao, Hong Liu, Sen Bai. A recoverable chaos-based fragile watermarking with high PSNR preservation |
2387 | -- | 2396 | Zhiwei Wang, Wenyang Liu. CP-ABE with outsourced decryption and directionally hidden policy |
2397 | -- | 2411 | Yinghui Zhang, Jin Li 0002, Xiaofeng Chen 0001, Hui Li. Anonymous attribute-based proxy re-encryption for access control in cloud computing |
2412 | -- | 2421 | Feng Wang, Chin-Chen Chang, Shih-Chang Chang. Robust off-line e-cash scheme with recoverability and anonymity revocation |
2422 | -- | 2433 | Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi. Revocable and strongly unforgeable identity-based signature scheme in the standard model |
2434 | -- | 2447 | Asif Iqbal Hajamydeen, Nur Izura Udzir. A refined filter for UHAD to improve anomaly detection |
2448 | -- | 2475 | Anfeng Liu, Xiao Liu, Yuxin Liu. A comprehensive analysis for fair probability marking based traceback approach in WSNs |
2476 | -- | 2483 | Chin-Chen Chang, Wei-yi Chen, Shih-Chang Chang. A highly efficient and secure electronic cash system based on secure sharing in cloud environment |
2484 | -- | 2556 | Sunil Kumar, Kamlesh Dutta. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges |
2557 | -- | 2575 | Hassan Alizadeh, André Zúquete. Traffic classification for managing Applications' networking profiles |