Efficient and provable secure scheme for delegation of signing rights between the groups Rajeev Anand SahuSahadeo PadhyeNavaneet Ojha OriginalPaper 21 February 2015 Pages: 369 - 379
Performance analysis of semi-blind two-way AF relaying over generalized-k fading channels Wided Hadj AlouaneNoureddine Hamdi OriginalPaper 24 March 2015 Pages: 381 - 394
Strongly secure certificateless key-insulated signature secure in the standard model Yanan ChenWeixiang XuHu Xiong OriginalPaper 01 April 2015 Pages: 395 - 405
Conversion from mono-axial to isotropic measurements for assessing human exposure to electromagnetic fields of GSM/DCS/UMTS base stations Mladen KoprivicaAleksandar NeškovićNataša Nešković OriginalPaper 23 April 2015 Pages: 407 - 414
Performance of adaptive modulation with optimal switching thresholds for distributed antenna system in composite channels Binbin WuXiangbin YuMing Chen OriginalPaper 20 May 2015 Pages: 415 - 426
A novel hybrid prediction algorithm to network traffic Dingde JiangZhengzheng XuHongwei Xu OriginalPaper 05 June 2015 Pages: 427 - 439
STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost Jean-François CouchotRaphael CouturierChristophe Guyeux OriginalPaper 12 June 2015 Pages: 441 - 449