203 | -- | 208 | Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim. Hijacking the Vuze BitTorrent network: all your hop are belong to us |
209 | -- | 218 | Guangyao Zhao, Ruilin Li, Lei Cheng, Chao Li, Bing Sun. Differential fault analysis on LED using Super-Sbox |
219 | -- | 222 | Weijia Xue, Xuejia Lai. Impossible differential cryptanalysis of MARS-like structures |
223 | -- | 233 | Amir Salah Elsafrawey, Emad S. Hassan, Moawad I. Dessouky. Cooperative hybrid self-healing scheme for secure and data reliability in unattended wireless sensor networks |
234 | -- | 239 | Mohammad Hesam Tadayon, Hadi Khanmohammadi, Mohammad Sayad Haghighi. Dynamic and verifiable multi-secret sharing scheme based on Hermite interpolation and bilinear maps |
240 | -- | 247 | Keshnee Padayachee. Aspectising honeytokens to contain the insider threat |
248 | -- | 255 | Nasrollah Pakniat, Mahnaz Noroozi, Ziba Eslami. Distributed key generation protocol with hierarchical threshold access structure |