71 | -- | 79 | Shih-Ting Hsu, Chou Chen Yang, Min-Shiang Hwang. A Study of Public Key Encryption with Keyword Search |
80 | -- | 96 | Heba Kamal Aslan, Ghada F. ElKabbany. Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol |
97 | -- | 105 | Mueen Uddin, Azizah Abdul Rahman, Naeem Uddin, Jamshed Memon, Raed A. Alsaqour, Suhail Kazi. Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents |
106 | -- | 112 | G. Manikandan, M. Kamarasan, N. Sairam. A New Approach for Secure Data Transfer based on Wavelet Transform |
113 | -- | 121 | B. Surekha, G. N. Swamy. Sensitive Digital Image Watermarking for Copyright Protection |
122 | -- | 132 | Changsha Ma, Kaiping Xue, Peilin Hong. A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks |
133 | -- | 138 | Mingwu Zhang, Jintao Yao, Chunzhi Wang, Tsuyoshi Takagi. Public Key Replacement and Universal Forgery of a SCLS Scheme |
139 | -- | 147 | Chin-Chen Chang, Chia-Yin Lee. A Smart Card-based Authentication Scheme Using User Identify Cryptography |
148 | -- | 150 | Kitae Kim, Hyung-Don Kim, Seungho Kim, Ikkwon Yie. Remarks on Zhang et al.'s Analysis on a Short Signature Scheme and Their Improvement |