507 | -- | 512 | Xiao-Min Wang, Wen-Fang Zhang, Jia-Shu Zhang, Muhammad Khurram Khan. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards |
513 | -- | 520 | Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong-Hoon Lee. Efficient verifier-based password-authenticated key exchange in the three-party setting |
521 | -- | 527 | Rongxing Lu, Zhenfu Cao, Licheng Wang, Congkai Sun. A secure anonymous routing protocol with authenticated key exchange for ad hoc networks |
528 | -- | 530 | Raphael C.-W. Phan. Reducing the exhaustive key search of the Data Encryption Standard (DES) |
531 | -- | 545 | Min-Xiou Chen, Chen-Jui Peng, Ren-Hung Hwang. SSIP: Split a SIP session over multiple devices |
546 | -- | 560 | J. Silvestre, V. Sempere. An architecture for flexible scheduling in Profibus networks |
561 | -- | 570 | Ming-Shi Wang, Wei-Che Chen. A majority-voting based watermarking scheme for color image tamper detection and recovery |
571 | -- | 579 | Cheng-Huang Tung. Key reduction of a Chinese phonetic input method by minimizing message ambiguity |
580 | -- | 583 | Kyung-Ah Shim. Potential weaknesses of AuthA password-authenticated key agreement protocols |
584 | -- | 600 | Yuting Zhang, Jianxin Liao, Xiaomin Zhu, Wei Wu, Jun Ma. Inter-working between SIMPLE and IMPS |