587 | -- | 598 | Junjie Lv, Chen Zhao. Security analysis of online digital goods business based on stochastic game net model |
599 | -- | 612 | Lukas Malina, Jan Hajny, Vaclav Zeman. Light-weight group signatures with time-bound membership |
613 | -- | 621 | Wei Luo, Wenping Ma, Qiang Gao. A dynamic trust management system for wireless sensor networks |
622 | -- | 633 | Dong Lai Fu, Xinguang Peng, Yuli Yang. Unbalanced tree-formed verification data for trusted platforms |
634 | -- | 651 | Brindha Murugan, Ammasai Gounden Nanjappa Gounder, Sriram Manohar. A hybrid image encryption algorithm using chaos and Conway's game-of-life cellular automata |
652 | -- | 666 | Tzer-Long Chen, Yu-Ting Liao, Yi-Fan Chang, Jen-Hung Hwang. Security approach to controlling access to personal health records in healthcare service |
667 | -- | 679 | Tzonelih Hwang, Prosanta Gope. Robust stream-cipher mode of authenticated encryption for secure communication in wireless sensor network |
680 | -- | 696 | Fuzhi Zhang, Honghong Chen. An ensemble method for detecting shilling attacks based on ordered item sequences |
697 | -- | 0 | Yilei Wang, Zhe Liu, Qiuliang Xu. Corrigendum to "New Rational Parties Relying on Reputation" |