91 | -- | 99 | Dionysis Kefallinos, Efstathios D. Sykas. 'A public key infrastructure model for privacy-enhancing general purpose eIDs' |
100 | -- | 107 | Chin-Chen Chang, Yeh-Chieh Chou, Chin-Yu Sun. Novel and practical scheme based on secret sharing for laptop data protection |
108 | -- | 118 | Huaqun Wang. Anonymous multi-receiver remote data retrieval for pay-TV in public clouds |
119 | -- | 126 | S. Maria Celestin Vigila, K. Muneeswaran, W. T. B. A. Antony. Biometric security system over finite field for mobile applications |
127 | -- | 135 | Hong Xu, Yonghui Zheng, Xuejia Lai. Construction of perfect diffusion layers from linear feedback shift registers |
136 | -- | 147 | Jingqiang Lin, Wen Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao. RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility |