Abstract is missing.
- On the Construction of the 4 x 4 Lightest Circulant MDS MatricesShiyi ZHANG, Yongjuan Wang, Yang Gao, Tao Wang. 1-6 [doi]
- On Equivalence with Output Sequence of Grain ModelHong Wang, Jie Guan. 7-11 [doi]
- Feasibility Analysis of Lattice-based Proxy Re-EncryptionXuyang Wang, Aiqun Hu, Hao Fang. 12-16 [doi]
- On A Class Pseudo-Dynamic Substitutions PD-Sbox, With A Perfect Averaged Distribution of Differentials in Static Mode of WorkSergey Polikarpov, Dmitry Petrov, Alexey Kozhevnikov. 17-21 [doi]
- Ternary Linear Codes with Few Weights from Functions with Two VariablesYongfeng Niu, Yanfeng Qi. 22-27 [doi]
- Variance Analysis of Pixel-Value Differencing SteganographyHao Zhang, Tao Zhang, Huajin Chen. 28-32 [doi]
- A Video Dual Watermarking Algorithm Against Geometric Attack Based on Integer Wavelet and SIFTQi Gao, Zhi Li, Shuqin Chen. 33-37 [doi]
- A Privacy-Preserving Method for Photo Sharing in Instant Message SystemsFengHua Li, Jingyang Yu, Lingcui Zhang, Zhe Sun, Mengfan Lv. 38-43 [doi]
- Security Communication for AMI on Basis of ECC and ESPXidong Zhang, Weiming Tong, Zhongwei Li. 44-48 [doi]
- A Practical Compartmentation Approach for the Android App CoexistenceHongmu Han, Ruixuan Li. 49-55 [doi]
- Cross-site Scripting Attacks on Android Hybrid ApplicationsWenying Bao, Wenbin Yao, Ming Zong, Dongbin Wang. 56-61 [doi]
- Covert Channel over Network Time ProtocolAidin Ameri, Daryl Johnson. 62-65 [doi]
- A Matrix Decomposition based Webshell Detection MethodXin Sun, Xindai Lu, Hua Dai. 66-70 [doi]
- Zero-Knowledge Identification Scheme Based on Symmetry Ergodic Matrices Exponentiation ProblemHuawei Huang, Yunyun Qu, Lunzhi Deng. 71-75 [doi]
- A Nonrepudiable Threshold Proxy Signature Scheme against Forgery AttackDanni Liu, Lijuan Wang, Can Wang, Pengyuan Huo. 76-80 [doi]
- Features of the Photon Pulse Detection Algorithm in the Quantum Key Distribution SystemA. P. Pljonkin. 81-84 [doi]
- Packet Leak Detection on Hardware-Trojan Infected NoCs for MPSoC SystemsMubashir Hussain, Hui Guo. 85-90 [doi]
- Research on Information Security Framework of Intelligent Connected VehicleBowei Zou, Mingqiu Gao, Xiaochuan Cui. 91-95 [doi]
- MGeT: Malware Gene-Based Malware Dynamic AnalysesJianwei Ding, Zhouguo Chen, Yue Zhao, Hong Su, Yubin Guo, Enbo Sun. 96-101 [doi]
- Real-Time Intrusion Detection Method Based on Bidirectional Access of Modbus/TCP ProtocolXiaoshuai Xin, Cancheng Liu, Bin Wang. 102-106 [doi]
- FL-GUARD: A Detection and Defense System for DDoS Attack in SDNJing Liu, Yingxu Lai, Shixuan Zhang. 107-111 [doi]
- Attribute-based Access Control with Dynamic Trust in a Hybrid Cloud Computing EnvironmentZhiyuan Zhao, Lei Sun. 112-118 [doi]
- A Semi-Formal Multi-Policy Secure Model for Semantic Spatial TrajectoriesXingang Wang, Kuo Guo, Zhigang Gai. 119-125 [doi]
- Development of Intelligent Digital Certificate Fuzzer ToolB. Chandrasekar, Bharath Ramesh, Vishalakshi Prabhu, S. Sajeev, Pratik K. Mohanty, G. Shobha. 126-130 [doi]
- Logical Language of Certificate-Based Access Control in Security ModelsM. M. Kucherov, N. A. Bogulskaya. 131-135 [doi]
- Online Biometric Authentication Using Subject-Specific Band Power features of EEGKavitha P. Thomas, A. Prasad Vinod, Neethu Robinson. 136-141 [doi]
- A Defense Method against Docker Escape AttackZhiqiang Jian, Long Chen. 142-146 [doi]