97 | -- | 105 | Li Zhang, Weiwei Xiao, Zhen Ji. Local affine transform invariant image watermarking by Krawtchouk moment invariants |
106 | -- | 110 | Marc Joye, Pascal Manet, Jean-Baptiste Rigaud. Strengthening hardware AES implementations against fault attacks |
111 | -- | 118 | Atefeh Mashatan, Douglas R. Stinson. Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions |
119 | -- | 127 | Peter Mell, Karen Scarfone. Improving the Common Vulnerability Scoring System |
128 | -- | 133 | Marco Bucci, Raimondo Luzzi, Francesco Menichelli, Renato Menicocci, Mauro Olivieri, Alessandro Trifiletti. Testing power-analysis attack susceptibility in register-transfer level designs |
134 | -- | 141 | C. M. Lo, Tzonelih Hwang, Chuan-Ming Li. Revocation-free public-key encryption based on security-mediated public-key infrastructure |