265 | -- | 270 | Jianhua Li, Hui Liu. Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map |
271 | -- | 276 | Xiaopeng Yan, Peng Gong, Zhiquan Bai, Jiantao Wang, Ping Li. New certificateless public key encryption scheme without pairing |
277 | -- | 282 | Jagadeesan Dhanapal, Srinivasa Krishna Srivatsa. Link quality-based cache replacement technique in mobile ad hoc network |
283 | -- | 292 | Ping Chen, Rui Wu, Bing Mao. JITSafe: a framework against Just-in-time spraying attacks |
293 | -- | 299 | Jialin Huang, Xuejia Lai. Chosen-plaintext linear attacks on Serpent |
300 | -- | 311 | Angela Piper, Reihaneh Safavi-Naini. Scalable fragile watermarking for image authentication |
312 | -- | 317 | Qassim Al Mahmoud. Polynomial differential-based strong (n, t, n)-verifiable secret sharing |
318 | -- | 326 | Fang Ren, Jiulun Fan. An adaptive distributed certificate management scheme for space information network |
327 | -- | 335 | Brendan Cronin, Xiaojun Wang. Hardware acceleration of regular expression repetitions in deep packet inspection |
343 | -- | 348 | Dong Jiao, MingChu Li, Jinping Ou, Cheng Guo, Yizhi Ren, Yongrui Cui. Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management |
349 | -- | 354 | Baozeng Ding, Yeping He, Yanjun Wu, Jiageng Yu. Systemic threats to hypervisor non-control data |