207 | -- | 225 | Syed Amma Sheik, M. Amutha Prabakar. An efficient and provably secure authentication scheme based on elliptic curve signature using a smart card |
226 | -- | 238 | Rahul Saha, Gulshan Kumar, Mritunjay Kumar Rai, Hye-Jin Kim 0003. Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks |
239 | -- | 254 | Saravanan Paramasivam, Shanthi Rekha Shanmugham. Time-shared AES-128 implementation with extremely low-cost for smart card applications |
255 | -- | 271 | Xiaoqian Liu, Qianmu Li, Tao Li, Ming Wu. Privacy preserving techniques for decision trees |
272 | -- | 291 | Geeta Sharma, Sheetal Kalra. A robust multi-factor remote user authentication scheme for cloud-IoT services |
292 | -- | 306 | Fatemeh Rezaeibagha, Yi Mu 0001, Ke Huang, Leyou Zhang. Enhanced bitcoin with two-factor authentication |
307 | -- | 323 | Sreeja Cherillath Sukumaran, Mohammed Misbahuddin. Secure key exchange scheme: a DNA computing-based approach to resist MITM in DHKE |
324 | -- | 354 | Gaurav Pareek, B. R. Purushothama. Blockchain-based decentralised access control scheme for dynamic hierarchies |
355 | -- | 374 | Zyad Elkhadir, Mohammed Benattou. p-LDA approach for intrusion detection system |
375 | -- | 384 | Zhengjun Cao, Xiqi Wang, Lihua Liu. One privacy-preserving multi-keyword ranked search scheme revisited |
385 | -- | 398 | Suliman A. Alsuhibany, Fatimah N. Almohaimeed, Naseem A. Alrobah. Synthetic Arabic handwritten CAPTCHA |
399 | -- | 419 | Chien-Ming Wang, Chih-Hung Wang. A highly secure three-party authentication key exchange protocol and its application in e-business communication with ECK model |