Abstract is missing.
- Block Sieve Reduction: A New Random Sampling Reduction Algorithm Based on Sieve AlgorithmsZedong Sun, Chunxiang Gu, Yonghui Zheng. 1-5 [doi]
- Secret Sharing Based BLMQ Signature GenerationYihong Long, Feng Xiong. 6-12 [doi]
- Efficiency Enhancements for Practical Techniques for Searches on Encrypted DataPansilu Pitigalaarachchi, Chandana Gamage. 13-18 [doi]
- Security and Encryption at Modern DatabasesMartin Ocenas, Ivan Homoliak, Petr Hanácek, Kamil Malinka. 19-23 [doi]
- Forward Secure Dynamic Searchable Symmetric Encryption with Lighter StorageJing Chen, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Xingkai Wang. 24-30 [doi]
- On Components of a Patient-centered Healthcare System Using Smart ContractNghia Duong-Trung, Ha Xuan Son, Hai Trieu Le, Tan Tai Phan. 31-35 [doi]
- Quantum Cryptography and Simulation: Tools and TechniquesShuangbao Wang, Matthew Rohde, Amjad Ali. 36-41 [doi]
- Botnet Host Detection Based on Heartbeat AssociationWei Ding, Zidong Hua, Panhui Li, Qiushi Gong, Yuxi Cheng. 42-46 [doi]
- A Novel Concolic Execution Approach on Embedded DeviceChengwei Ai, Weiyu Dong, Zicong Gao. 47-52 [doi]
- Routing Authentication Chain Mechanism to Resist AODV Black Hole AttacksKunyu Liu, Liang Zhou. 53-57 [doi]
- Quality-based Score Level Fusion for Continuous Authentication with Motion Sensor and FaceShixuan Wang, Jiabin Yuan, Shudi Chen. 58-62 [doi]
- A Privacy-Preserving Friend Recommendation Mechanism for Online Social NetworksFukang Liu, Guorui Wu, Yang Liu. 63-67 [doi]
- A New Type of Two-dimensional Anti-counterfeit Code for Document Authentication Using Neural NetworksZhouping Cui, Weihai Li, Chaohai Yu, Nenghai Yu. 68-73 [doi]
- A Novel Ensemble Anomaly based Approach for Command and Control Channel DetectionTao Chen, GuangMing Zhou, Zhangpu Liu, Tao Jing. 74-78 [doi]
- An Information Intelligent Search Method for Computer Forensics Based on Text SimilarityZhongxin Yang, Zhifeng Chen, Ping Zhang, Ming Liu, QingBao Li. 79-83 [doi]
- The Detection of Network Intrusion Based on Improved Adaboost AlgorithmQuanmin Wang, Xuan Wei. 84-88 [doi]
- A Personal Data Determination Method Based On Blockchain Technology and Smart ContractHongman Wang, Yongbin Yuan, Fangchun Yang. 89-94 [doi]
- Quantum Relay Blockchain and Its Applications in Key ServiceHui Chen. 95-99 [doi]
- Design and Implementation of the Digital Education Resources Authentication System Based on BlockchainGang Zhao, Hui He, Bingbing Di. 100-104 [doi]
- Smart Care: Integrating Blockchain Technology into the Design of Patient-centered Healthcare SystemsNghia Duong-Trung, Ha Xuan Son, Hai Trieu Le, Tan Tai Phan. 105-109 [doi]
- Static Analysis of Integer Overflow of Smart Contracts in EthereumEnmei Lai, Wenjun Luo. 110-115 [doi]
- An Encryption and Decryption Outsourcing CP-ABE scheme Supporting Efficient Ciphertext EvolutionXincheng Yan, Yue Chen, Yuchang Zhai, Yang Ba, Xuewei Li, Hongyong Jia. 116-125 [doi]
- Detection of Voice Transformation Disguise Based on Deep Residual NetYong Wang, Mengge Zhang, Zhengyu Zhu. 126-130 [doi]
- A High-throughput Low-area Entropy Source Based on Asynchronous Feedback UnitPing Wang, Jinjiang Yang, Min Zhu, Bo Liu. 131-135 [doi]
- A Trust Management Model for Internet of VehiclesYonghao Wang. 136-140 [doi]
- A Shape-inference-based Approach to Enhance Constraint Independence OptimizationJian Lin, Liehui Jiang, Chengwei Ai, Shihong Chao. 141-145 [doi]
- UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow FusionLianxiao Meng, Shuangyin Ren, Gaigai Tang, Chao Yang, Wu Yang. 146-151 [doi]