111 | -- | 124 | W. T. Huang, Chih-Hsiang Chang, Che Wun Chiou, Fu-Hua Chou. m) |
125 | -- | 136 | Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater. How to strongly link data and its medium: the paper case |
137 | -- | 148 | Sergio Bravo-Solorio, Lu Gan, Asoke K. Nandi, Maurice F. Aburdene. Secure private fragile watermarking scheme with improved tampering localisation accuracy |
149 | -- | 157 | Joan Daemen, Vincent Rijmen. Refinements of the ALRED construction and MAC security claims |
158 | -- | 166 | A. U. Yargiçoglu, Hakki Gökhan Ilk. Hidden data transmission in mixed excitation linear prediction coded speech using quantisation index modulation |
167 | -- | 184 | Xianfeng Zhao, Dengguo Feng. Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round |