126 | -- | 140 | Chunying Wu, Shundong Li, Yiying Zhang. Key management scheme based on secret sharing for wireless sensor networks |
141 | -- | 158 | Yan Ren, Chunming Tang, Guilin Wang, Duncan S. Wong. Attribute-based signature schemes with accountability |
159 | -- | 184 | Hiren J. Patel, Christine Schubert-Kabban, Rusty O. Baldwin, David P. Montminy. Statistical analysis and comparison of linear regression attacks on the advanced encryption standard |
185 | -- | 201 | Zhiqiang Lin. On two circuit configurations of non-linear feedback shift registers |
202 | -- | 217 | Dongyan Zhang, Tao Zhang, Pingxin Du. A real-time data backup model and methods based on peer-to-peer network |
218 | -- | 234 | Tapashi Kashyap Das, P. H. Talukdar, Kishore Dutta. Hidden Markov model-based Assamese vowel phoneme recognition using cepstral features |
235 | -- | 246 | Haining Luo, Xu an Wang. New signature schemes in the standard model based on publicly verifiable CCA-secure public key encryption |
247 | -- | 262 | Shangping Wang, Lihua Liu, Jin Sun, Yaling Zhang. Multi-party concurrent signatures scheme from lattice |
263 | -- | 277 | Xia Deng, Jianxin Wang, Le Chang. Sociality-based comprehensive buffer management for multicast in DTNs |
278 | -- | 286 | Huai Wu, Chunxiang Xu, Jiang Deng. Server-aided aggregate verification signature: security definition and construction |
287 | -- | 301 | Lin Cheng, Qiaoyan Wen. Provably secure and efficient certificateless signature in the standard model |
302 | -- | 315 | Peng Xiao, Dongbo Liu. Improving network routing energy-efficiency for real-time workloads by stochastic service model |
316 | -- | 323 | Xia Shao, Weidang Zhang, Ping Li. Decreasing the BER of turbo codes with short frame by optimising the energy allocation |
324 | -- | 332 | Xueyu Huang, Yongbo Xiang, Chuangming Tong, Na Wei. Design of a microwave down-converter module |