1 | -- | 6 | Chunbo Ma, Jun Ao. Certificateless Group Oriented Signature Secure Against Key Replacement Attack |
7 | -- | 12 | R. Rajaram Ramasamy, M. Amutha Prabakar. Digital Signature Scheme with Message Recovery Using Knapsack-based ECC |
13 | -- | 20 | Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elramly. New Real Time Multicast Authentication Protocol |
21 | -- | 28 | Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury. Fault Attack, Countermeasures on Pairing Based Cryptography |
29 | -- | 41 | Faisal Nabi. Designing a Secure Framework Method for Secure Business Application Logic Integrity in e-Commerce Systems |
42 | -- | 49 | Peyman Kabiri, Mehran Aghaei. Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks |
50 | -- | 57 | Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi. Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor |
58 | -- | 60 | Chi-Yu Liu, Cheng-Chi Lee, Tzu-Chun Lin. Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme |