Xiaofeng Chen, and Hui Zhu Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on, p.253 ,
and Pankoo Kim On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML), p.261 ,
Jinjing Zhao, and Minhuan Huang Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation, p.312 ,
318 Xiaoxia Sun Jinjing Zhao, and Minhuan Huang A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via, p.324 ,
Zhang Identity Management Lifecycle -Exemplifying the Need for Holistic Identity Assurance Frameworks, Jostein Jensen Cryptography Anonymous Lattice-Based Broadcast Encryption, vol.343, p.353 ,
Provenance, p.363 ,
Sakurai New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation, 373 Xingxing Xie, p.383 ,
Xiaoqing Li, and Hui Zhu A Block Cipher Mode of Operation with Two Keys, p.392 ,
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control 441 Nisreen Alam Aldeen and Gerald Quirchmayr Toward Secure Clustered Multi-Party Computation: A Privacy- Preserving Clustering Protocol, 447 Sedigheh Abbasi, Stelvio Cimato, and Ernesto Damiani A Real, p.453 ,
Wanrong Yu, and Ilsun You Network Analysis and Security CSP-Based General Detection Model of Network Covert Storage Channels, p.459 ,
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction, p.490 ,
DOI : 10.1007/978-3-642-36818-9_55
URL : https://hal.archives-ouvertes.fr/hal-01480208
and Umberto Ferraro Petrillo Multimedia Security An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation, 513 Huan Wang, Mingxing He, and Xiao Li ,
Nanna Suryana, and Shahrin Sahib A Data Structure for Efficient Biometric Identification, p.528 ,
Moon and Sung Bum Pan Shifting Primes on OpenRISC Processors with Hardware Multiplier, p.540 ,