129 | -- | 134 | Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba. Impossible differential cryptanalysis of reduced-round Camellia-256 |
135 | -- | 144 | Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera. Approach to security assessment of critical infrastructures' information systems |
145 | -- | 151 | Ashok Kumar Das. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards |
152 | -- | 162 | W. T. Huang, Chih-Hsiang Chang, Che Wun Chiou, S. Y. Tan. m) |
163 | -- | 169 | Luis Javier García-Villalba, Julián García Matesanz, Delfín Rupérez Cañas, Ana Lucila Sandoval Orozco. Secure extension to the optimised link state routing protocol |
170 | -- | 180 | Xinchao Li, Ju Liu, Jiande Sun, Xiaohui Yang, Wei Liu. Step-projection-based spread transform dither modulation |