1 | -- | 8 | Seher Sener, Ibrahim Develi, Nurhan Karaboga. Further performance analysis of the generalized MC DS-CDMA system in Nakagami-m fading channels |
9 | -- | 17 | Baoyuan Kang, Colin Boyd, Ed Dawson. A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification |
18 | -- | 32 | Christopher Martinez, Mythri Pinnamaneni, Eugene B. John. Performance of commercial multimedia workloads on the Intel Pentium 4: A case study |
33 | -- | 40 | Wen-Shenq Juang, Jing-Lin Wu. Two efficient two-factor authenticated key exchange protocols in public wireless LANs |
41 | -- | 48 | Tzungher Chen, Wei-Bin Lee, Hsing-Bai Chen. A self-verification authentication mechanism for mobile satellite communication systems |
49 | -- | 53 | Baoyuan Kang, Colin Boyd, Ed Dawson. Identity-based strong designated verifier signature schemes: Attacks and new construction |
54 | -- | 58 | Miguel Morales-Sandoval, Claudia Feregrino Uribe, René Cumplido, Ignacio Algredo-Badillo. An area/performance trade-off analysis of a GF(2:::m:::) multiplier architecture for elliptic curve cryptography |
59 | -- | 70 | Wei Zhang, Liansheng Tan, Gang Peng. Dynamic queue level control of TCP/RED systems in AQM routers |
71 | -- | 85 | Erdinç Öztürk, Berk Sunar, Erkay Savas. A versatile Montgomery multiplier architecture with characteristic three support |
86 | -- | 95 | Feng Cao, Zhenfu Cao. A secure identity-based multi-proxy signature scheme |
96 | -- | 106 | Azizollah Jamshidi, Bizhan Karimi-Birgani. Multiple partner coded cooperation scheme for wireless communications and its performance analysis for two cooperative users |
107 | -- | 114 | Hyun Seok Kim, Jin-Young Choi. Enhanced password-based simple three-party key exchange protocol |
115 | -- | 125 | Cihan Topal, Cuneyt Akinlar. Secure seamless peer-to-peer (P2P) UDP communication using IPv4 LSRR option and IPv4+4 addresses |
126 | -- | 140 | Ali A. Kanso. An efficient cryptosystem Delta for stream cipher applications |
141 | -- | 149 | Ying Zheng, Guangyao Li, Xiehua Sun, Xinmin Zhou. Fast edge integration based active contours for color images |
150 | -- | 158 | Baodong Qin, Ming Li, Fanyu Kong, Daxing Li. New left-to-right minimal weight signed-digit radix-r representation |
159 | -- | 167 | Soonhak Kwon, Chang Hoon Kim, Chun-Pyo Hong. More efficient systolic arrays for multiplication in GF(2:::m:::) using LSB first algorithm with irreducible polynomials and trinomials |
168 | -- | 182 | Jamal-Deen Abdulai, Mohamed Ould-Khaoua, Lewis M. Mackenzie. Adjusted probabilistic route discovery in mobile ad hoc networks |
183 | -- | 188 | Wei Lu, Wei Sun, Hongtao Lu. Robust watermarking based on DWT and nonnegative matrix factorization |
189 | -- | 196 | Zuhua Shao. Dynamic and efficient joint encryption scheme in the plain public key model |
197 | -- | 208 | Omar Al-Jarrah, Omar Megdadi. Enhanced AODV routing protocol for Bluetooth scatternet |
209 | -- | 217 | D. Gnanadurai, V. Sadasivam, J. Paul Tiburtius Nishandh, L. Muthukumaran, C. Annamalai. Undecimated double density wavelet transform based speckle reduction in SAR images |
218 | -- | 226 | P. P. Sahu, Mahipal Singh. Multichannel direct sequence spectrum signaling using code phase shift keying |