1 | -- | 8 | Quan Qian, Chao-Jie Xiao, Rui Zhang 0013. Grid-based Data Stream Clustering for Intrusion Detection |
9 | -- | 15 | Kakali Chatterjee, Asok De, Daya Gupta. Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices |
16 | -- | 22 | Quan Qian, Tianhong Wang, Rui Zhang 0013. Relative Network Entropy based Clustering Algorithm for Intrusion Detection |
23 | -- | 27 | G. A. V. Rama Chandra Rao, P. V. Lakshmi, N. Ravi Shankar. A New Modular Multiplication Method in Public Key Cryptosystem |
28 | -- | 41 | Xiuxia Tian, Xiaoling Wang, Aoying Zhou. DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS |
42 | -- | 49 | Benamar Kadri, Djilalli Moussaoui, Mohammed Feham. A PKI over Ant Colony based Routing Algorithms for MANETs -AntPKI- |
50 | -- | 58 | Mehran Asadi, Christopher Zimmerman, Afrand Agah. A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks |
59 | -- | 63 | Jianqin Zhou, Wei Xiong. An Algorithm for Computing m-Tight Error Linear Complexity of Sequences over GF(p^m) with Period p^m |
64 | -- | 67 | Cheng-Chi Lee, Chia-Hsin Liu, Min-Shiang Hwang. Guessing Attacks on Strong-Password Authentication Protocol |
68 | -- | 70 | Abdel Alim Kamal. Cryptanalysis of a Polynomial-based Key Management Scheme for Secure Group Communication |