239 | -- | 248 | Y. Yang, J. Gu, C. Lv, Q. Jiang, W. Ma. Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems |
249 | -- | 257 | Kun Peng. Critical survey of existing publicly verifiable secret sharing schemes |
258 | -- | 263 | Haibo Tian. Deniable message transmission authenticator based on weak signature schemes |
264 | -- | 270 | P. Bhattacharya, S. K. Ghosh. Analytical framework for measuring network security using exploit dependency graph |
271 | -- | 280 | Mahdi R. Alaghband, Mohammad Reza Aref. Dynamic and secure key management model for hierarchical heterogeneous sensor networks |
281 | -- | 290 | Huaqun Wang, Bo Qin. Improved one-to-many authentication scheme for access control in pay-TV systems |
291 | -- | 298 | Yung-Wei Kao, Xin Zhang 0003, Ahren Studer, Adrian Perrig. Mobile encryption for laptop data protection (MELP) |
299 | -- | 309 | Xiaotian Wu, Wei Sun. Visual secret sharing for general access structures by random grids |
310 | -- | 317 | Che Wun Chiou, Hung Wei Chang, Wen-Yew Liang, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh. m) |
318 | -- | 323 | Che Wun Chiou, Tai-Pao Chuang, Shun-Shii Lin, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh. m) with odd type t |
324 | -- | 328 | Jenq-Haur Wang, Hung Wei Chang, Che Wun Chiou, Wen-Yew Liang. m) |
329 | -- | 336 | Martin Ă…gren, Martin Hell, Thomas Johansson. On hardware-oriented message authentication |