1 | -- | 13 | Kevin Curran, Vivian Maynes, Declan Harkin. Mobile device security |
14 | -- | 38 | Haixia Xu, Bao Li, Qixiang Mei. Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes |
39 | -- | 48 | Lei Niu, Changqing Zhang, Qi Xia, Yong Yu. Advanced security analysis of a signature scheme with message recovery |
49 | -- | 63 | Narayanan Prasanth, Kannan Balasubramanian. Performance analysis of buffered crossbar switch scheduling algorithms |
64 | -- | 90 | Olayemi M. Olaniyi, Oladiran T. Arulogun, Oluwasayo E. Omidiora, Oladotun O. Okediran. Implementing generic security requirements in e-voting using modified stegano-cryptographic approach |