123 | -- | 130 | Chin-Ling Chen, Jyun-Jie Liao. Fair offline digital content transaction system |
131 | -- | 140 | Revathi Venkataraman, Mullur Pushpalatha, T. Rama Rao. Regression-based trust model for mobile ad hoc networks |
141 | -- | 148 | Gregory Epiphaniou, Carsten Maple, Paul Sant, Ghazanfar Ali Safdar. Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls |
149 | -- | 156 | Changhua Sun, Chengchen Hu, Bin Liu 0001. 2: effective SYN flood detection against skillful spoofs |
157 | -- | 170 | Tai-Pao Chuang, Che Wun Chiou, Shun-Shii Lin, Chiou-Yng Lee. m) |
171 | -- | 182 | Qutaiba Ibrahim Ali, S. Iazim. Design and implementation of an embedded intrusion detection system for wireless applications |
183 | -- | 189 | Xiaobei Liu, Soo Ngee Koh, Xin-Wen Wu, Chee Cheon Chui. Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers |
190 | -- | 201 | Parisa Babaheidarian, Somayeh Salimi, Mohammad Reza Aref. Simultaneously generating multiple keys in a four-terminal network |
202 | -- | 211 | Iksu Kim, MyungHo Kim. Agent-based honeynet framework for protecting servers in campus networks |
212 | -- | 218 | Zhijun Li, Guang Gong. C entity authentication for low-cost pervasive devices |
219 | -- | 227 | Tomasz Hyla, Imed El Fray, Witold Mackow, Jerzy Pejas. Long-term preservation of digital signatures for multiple groups of related documents |
228 | -- | 238 | Jiqiang Lu, Yongzhuang Wei, Pierre-Alain Fouque, Jongsung Kim. Cryptanalysis of reduced versions of the Camellia block cipher |