Y. Feng, H. Ma-twitter, and .. , Xiaofeng Chen, and Hui Zhu Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on, p.253

D. Choi, I. You, and .. , and Pankoo Kim On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML), p.261

L. Liu, D. Wang, and .. , Jinjing Zhao, and Minhuan Huang Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation, p.312

S. Hou, R. Sasaki, V. Fuzzing, and .. , 318 Xiaoxia Sun Jinjing Zhao, and Minhuan Huang A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via, p.324

W. Jia, R. Li, and C. , Zhang Identity Management Lifecycle -Exemplifying the Need for Holistic Identity Assurance Frameworks, Jostein Jensen Cryptography Anonymous Lattice-Based Broadcast Encryption, vol.343, p.353

A. Georgescu-the-provenance and .. , Provenance, p.363

A. Syalim, T. Nishide, and K. , Sakurai New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation, 373 Xingxing Xie, p.383

Y. Zhang, H. Li, and .. , Xiaoqing Li, and Hui Zhu A Block Cipher Mode of Operation with Two Keys, p.392

A. Bkakria, F. Cuppens, N. Cuppens-boulahia, J. M. Fernandez, and .. , Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control 441 Nisreen Alam Aldeen and Gerald Quirchmayr Toward Secure Clustered Multi-Party Computation: A Privacy- Preserving Clustering Protocol, 447 Sedigheh Abbasi, Stelvio Cimato, and Ernesto Damiani A Real, p.453

B. Liu, B. Liu, B. Zhao, D. Zou, C. Wu et al., Wanrong Yu, and Ilsun You Network Analysis and Security CSP-Based General Detection Model of Network Covert Storage Channels, p.459

J. Zhao, Y. Wen, and .. , Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise Reduction, p.490
DOI : 10.1007/978-3-642-36818-9_55

URL : https://hal.archives-ouvertes.fr/hal-01480208

G. Cattaneo, G. D. Maio, P. Faruolo, and .. , and Umberto Ferraro Petrillo Multimedia Security An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation, 513 Huan Wang, Mingxing He, and Xiao Li

F. Nur-azman-abu and .. Ernawan, Nanna Suryana, and Shahrin Sahib A Data Structure for Efficient Biometric Identification, p.528

. Hae-min, Moon and Sung Bum Pan Shifting Primes on OpenRISC Processors with Hardware Multiplier, p.540