143 | -- | 151 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo. Comparing and debugging firewall rule tables |
152 | -- | 162 | Chunxiao Chigan, Leiyuan Li, Yinghua Ye. Self-adaptive approach for resource-aware security provisioning in wireless ad hoc networks |
163 | -- | 166 | O. O. Obi, Falah H. Ali, Elias Stipidis. Explicit expression for decryption in a generalisation of the paillier scheme |
167 | -- | 173 | Lanjun Dang, Weidong Kou, Nan Dang, Hui Li, Bin Zhao, Kai Fan. Mobile ip registration in certificateless public key infrastructure |