81 | -- | 86 | Xiaozhuo Gu, Jianzu Yang. Design Universal Security Scheme for Broadband Router |
87 | -- | 92 | S. Selvakani Kandeeban, Rengan S. Rajesh. Integrated Intrusion Detection System Using Soft Computing |
93 | -- | 106 | Aikaterini Mitrokotsa, Nikos Komninos, Christos Douligeris. Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks |
107 | -- | 113 | Rajaram Ramasamy, Amutha Prabakar Muniyandi. Computing the Modular Inverse of a Polynomial Function over GF(2:::P:::) Using Bit Wise Operation |
114 | -- | 120 | Qiang Tang, Dongyao Ji. Verifiable Attribute Based Encryption |
121 | -- | 124 | Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Samuel S. Wagstaff Jr.. Provable Partial Key Escrow |
125 | -- | 138 | Hongwei Li, Atam P. Dhawan. MOSAR: A Secured On-demand Routing Protocol for Mobile Multilevel Ad Hoc Networks |
139 | -- | 152 | Ramanarayana Kandikattu, Lillykutty Jacob. Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network |
153 | -- | 157 | Tongjiang Yan. New Binary Sequences of Period ::::pq:::: with Low Values of Correlation and Large Linear Complexity |
158 | -- | 160 | Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming Hu. Comment on Wu et al. s Server-aided Verification Signature Schemes |