1133 | -- | 1146 | Jangirala Srinivas, Ashok Kumar Das, Mohammad Wazid, Neeraj Kumar 0001. Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things |
1147 | -- | 1162 | Jose Ignacio Aizpurua, Yiannis Papadopoulos, Guillaume Merle. Explicit Modelling and Treatment of Repair in Prediction of Dependability |
1163 | -- | 1172 | Lu-Xing Yang, Pengdeng Li, Xiaofan Yang, Yuan Yan Tang. A Risk Management Approach to Defending Against the Advanced Persistent Threat |
1173 | -- | 1187 | Jiayi Chen, Jianping He, Lin Cai 0001, Jianping Pan 0001. Disclose More and Risk Less: Privacy Preserving Online Social Network Data Sharing |
1188 | -- | 1206 | Liang Zhao, Liqun Chen. Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited |
1207 | -- | 1217 | Kai He, Jun Guo 0001, Jian Weng 0001, Jia-Si Weng, Joseph K. Liu, Xun Yi. Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data |
1218 | -- | 1231 | Leo Yu Zhang, Yifeng Zheng, Jian Weng 0001, Cong Wang 0001, Zihao Shan, Kui Ren 0001. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center |
1232 | -- | 1242 | Rekha Govindaraj, Swaroop Ghosh, Srinivas Katkoori. Design, Analysis and Application of Embedded Resistive RAM Based Strong Arbiter PUF |
1243 | -- | 1256 | Hui Xu 0009, Zirui Zhao, Yangfan Zhou, Michael R. Lyu. Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs |
1257 | -- | 1268 | Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla. A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising |
1269 | -- | 1282 | Rouzbeh Behnia, Muslum Ozgur Ozmen, Attila Altay Yavuz. Lattice-Based Public Key Searchable Encryption from Experimental Perspectives |
1283 | -- | 1296 | Yulai Xie, Dan Feng 0001, Yuchong Hu, Yan Li, Staunton Sample, Darrell D. E. Long. Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments |
1297 | -- | 1309 | Mihai Maruseac, Gabriel Ghinita. Precision-Enhanced Differentially-Private Mining of High-Confidence Association Rules |
1310 | -- | 1321 | Lin Yao, ZhenZhen Fan, Jing Deng 0001, Xin Fan, Guowei Wu. Detection and Defense of Cache Pollution Attacks Using Clustering in Named Data Networks |
1322 | -- | 1332 | Xueqiao Liu, Guomin Yang, Yi Mu 0001, Robert H. Deng. Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage |
1333 | -- | 1344 | Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant. The Authorization Policy Existence Problem |