A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. 3-10
Efficient proof of bid validity with untrusted verifier in homomorphic e-auction. 11-21
Yueming Deng, Guojun Wang, Jiannong Cao, Xin Xiao:
Practical secure and fast handoff framework for pervasive Wi-Fi access. 22-29
Xin Huang, Bangdao Chen, Andrew Markham, Qinghua Wang, Zheng Yan, A. William Roscoe:
Human interactive secure key and identity exchange protocols in body sensor networks. 30-38
Xiaoyong Li, Junping Du:
Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. 39-50
Weizhong Qiang, Deqing Zou, Shenglan Wang, Laurence Tianruo Yang, Hai Jin, Lei Shi:
CloudAC: a cloud-oriented multilayer access control system for logic virtual domain. 51-59
Xixiang Lv, Hui Li:
Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks.
Lo'ai Ali Tawalbeh, Moad Mowafi, Walid A. Aljoby:
Use of elliptic curve cryptography for multimedia encryption.
Ying Yan Hua, Jim-Min Lin, Che Wun Chiou, Chiou-Yng Lee, Yong Huan Liu:
Low space-complexity digit-serial dual basis systolic multiplier over Galois field GF(2m) using Hankel matrix and Karatsuba algorithm.
Fen Miao, Shu-Di Bao, Ye Li:
Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security.
Guangjie Han, Jinfang Jiang, Wen Shen, Lei Shu, Joel J. P. C. Rodrigues:
IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks.
Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang:
Fair (t, n) threshold secret sharing scheme.
Debiao He, Baojun Huang, Jianhua Chen:
New certificateless short signature scheme.
Khusvinder Gill, Shuang-Hua Yang, Wan-Liang Wang:
Secure remote access to home automation networks.
Mohammed I. Al-Saleh, Antonio M. Espinoza, Jedidiah R. Crandall:
Antivirus performance characterisation: system-wide view.
Yongzhuang Wei, Enes Pasalic:
On the approximation of S-boxes via Maiorana-McFarland functions.
Yung-Wei Kao, Kuan-Ying Huang, Hui-Zhen Gu, Shyan-Ming Yuan:
uCloud: a user-centric key management scheme for cloud data protection.
Salman Niksefat, Babak Sadeghiyan, Payman Mohassel:
Oblivious decision program evaluation.
Sedat Akleylek, Murat Cenk, Ferruh Özbudak:
On the generalisation of special moduli for faster interleaved montgomery modular multiplication. 165-171
Jung-San Lee, Wei-Chiang Kao, Bo Li:
Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness. 172-180
Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang:
Newmultivariate hash function quadratic polynomials multiplying linear polynomials. 181-188
Hung-Wen Yang, Chou Chen Yang, Woei Lin:
Enhanced digital rights management authentication scheme based on smart card. 189-194
Yoon-Ho Choi, Seung-Woo Seo:
BLAST: B-LAyered bad-character SHIFT tables for high-speed pattern matching. 195-202
Muthumanickam Gunasekaran, Kandhasamy Premalatha:
TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks. 203-211
Marco Baldi, Marco Bianchi, Franco Chiaraluce:
Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes. 212-220
Dimitrios S. Karas, George K. Karagiannidis, Robert Schober:
Channel level crossing-based security for communications over fading channels. 221-229
Ali Vardasbi, Mahmoud Salmasizadeh, Javad Mohajeri:
Superpoly algebraic normal form monomial test on Trivium. 230-238
Tsu-Yang Wu, Yuh-Min Tseng:
Publicly verifiable multi-secret sharing scheme from bilinear pairings. 239-246
Hsiu-lien Yeh, Tien-Ho Chen, Kuei-Jung Hu, Wei-Kuan Shih:
Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. 247-252
Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu:
Strong non-repudiation based on certificateless short signatures. 253-263
Jianhua Li, Hui Liu:
Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. 265-270
Xiaopeng Yan, Peng Gong, Zhiquan Bai, Jiantao Wang, Ping Li:
New certificateless public key encryption scheme without pairing. 271-276
Jagadeesan Dhanapal, Srinivasa Krishna Srivatsa:
Link quality-based cache replacement technique in mobile ad hoc network. 277-282
Ping Chen, Rui Wu, Bing Mao:
JITSafe: a framework against Just-in-time spraying attacks. 283-292
Jialin Huang, Xuejia Lai:
Chosen-plaintext linear attacks on Serpent. 293-299
Angela Piper, Reihaneh Safavi-Naini:
Scalable fragile watermarking for image authentication. 300-311
Qassim Al Mahmoud:
Polynomial differential-based strong (n, t, n)-verifiable secret sharing. 312-317
Fang Ren, Jiulun Fan:
An adaptive distributed certificate management scheme for space information network. 318-326
Brendan Cronin, Xiaojun Wang:
Hardware acceleration of regular expression repetitions in deep packet inspection. 327-335
Dong Jiao, Mingchu Li, Jinping Ou, Cheng Guo, Yizhi Ren, Yongrui Cui:
Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management. 343-348
Baozeng Ding, Yeping He, Yanjun Wu, Jiageng Yu:
Systemic threats to hypervisor non-control data. 349-354