- 568. Yuanxi Dai and John Steinberger. Indifferentiability of 8-Round Feistel Networks. IACR Cryptology ePrint Archive (2015).1069.
- 567. Bo Han, Jian Li and Aravind Srinivasan. Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random-Walk Sampling. IEEE/ACM Transactions on Networking (TON), 22 (5) :1389-1400,2014.
- 566. Ling-yu Wei. A faster triangle-to-triangle intersection test algorithm. Computer Animation and Virtual Worlds, v 25, n 5-6, p 553-559, September 1, 2014.
- 565. Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng and Ziping Wang. Robust password changing and DoS resilience for human-centric password authentication. Security and Communication Networks, v 7, n 10, p 1552-1559, October 1, 2014.
- 564. Andrew Chi-Chih Yao and Yunlei Zhao. Privacy-Preserving Authenticated Key-Exchange Over Internet. IEEE Transactions on Information Forensics and Security, v 9, n 1, p 125-140, January 2014.
- 563. Haoran Yu, Man Hon Cheung, Longbo Huang and Jianwei Huang. Predictive Delay-Aware Network Selection in Data Offloading. 2014 IEEE Global Communications Conference, GLOBECOM 2014, p 1376-1381, February 9, 2014.
- 562. Lei Song, Yong cai Wang, Ji Jiang Yang, Jian qiang Li. Health Sensing by Wearable Sensors and Mobile Phones: A Survey. 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services, Healthcom 2014, p 453-459, 2015.
- 561. Hong xing Li, Chuan Wu, Qiang Sheng Hua, Francis C.M. Lau. Latency-minimizing data aggregation in wireless sensor networks under physical interference model. Ad Hoc Networks, vol.12, n.1, pp.52-68, January 2014.
- 560. Hongyu Liang. Optimal Collapsing Protocol for Multiparty Pointer Jumping. Theory of Computing Systems, v 54, n 1, p 13-23, 2014.
- 559. Deeparnab Chakrabarty, Gagan Goel, Vijayv Vazirani, Lei Wang, Changyuan Yu. SUBMODULARITY HELPS IN NASH AND NONSYMMETRIC BARGAINING GAMES. SIAM Journal on Discrete Mathematics, v 28, n 1, p 99-115, 2014.
- 558. Weihao Gao; Polyanskiy, Y.. On the bit error rate of repeated error-correcting codes. 2014 48th Annual Conference on Information Sciences and Systems, CISS 2014, 2014, 2014.
- 557. Yuanxi Dai, Jooyoung Lee, Bart Mennink, and John Steinberger kmkuu. The Security of Multiple Encryption in the Ideal Cipher Model. Proceedings of Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, v 8616 LNCS, n PART 1, p 20-38, 2014.
- 556. Zhaoquan Gu, QiangSheng Hua, Yuexuan Wang, and Francis Chi Moon Lau. Oblivious Rendezvous in Cognitive Radio Networks. v 8576 LNCS, p 165-179, 2014, Structural Information and Communication Complexity - 21st International Colloquium, SIROCCO 2014, Proceedings.
- 555. Yuan Cao, YuHuai Li, Zhu Cao, Juan Yin, YuAo Chen, Xiongfeng Ma, Cheng-Zhi Peng and JianWei Pan. Direct counterfactual communication with single photons. Conference on Lasers and Electro-Optics Europe - Technical Digest, v 2014-January, 2014.
- 554. Tzameret Iddo. Sparser Random 3-SAT Refutation Algorithms and the Interpolation Problem (Extended Abstract). Proceedings of Automata, Languages, and Programming - 41st International Colloquium(ICALP 2014) vol.8572 LNCS, n.PART 1, pp.1015-1026, 2014,.
- 553. Li Jinliang, Yu Yu, Fu Rong, Li Xiangxue. Built-in determined sub-key correlation power analysis. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v E93-A, n 9, p 1632-1638, September 2010.
- 552. Claudio Chamon, Alioscia Hamma, and Eduardo R. Mucciolo. Emergent Irreversibility and Entanglement Spectrum Statistics. Physical Review Letters, v 112, n 24, June 16, 2014.
- 551. Qian Yang, Jia Jun Ma, Fen Zhuo Guo and Qiao Yan Wen. Semi-loss-tolerant strong quantum coin-flipping protocol using quantum non-demolition measurement. Quantum Information Processing, v 13, n 7, p 1537-1544, July 2014.