151 | -- | 160 | Sébastien Faye, Jean Frédéric Myoupo. Secure and Energy-efficient Geocast Protocol for Wireless Sensor Networks based on a Hierarchical Clustered Structure |
161 | -- | 170 | Qinyi Li, Hu Xiong, Fengli Zhang, Shengke Zeng. An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext |
171 | -- | 178 | Fangwei Wang, Yunkai Zhang, Honggang Guo, Changguang Wang. Combating Good Point Set Scanning-based Self-learning Worms by Using Predators |
179 | -- | 189 | Jeng-Ping Lin, Jih-Ming Fu. Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting |
190 | -- | 204 | Mehdi Bateni, Ahmad Baraani, Ali Ghorbani. Using Artificial Immune System and Fuzzy Logic for Alert Correlation |
205 | -- | 211 | Qi Duan, Mohit Virendra. On the Algorithms Related to Threshold Cryptography Based Network Protocols |
212 | -- | 218 | Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang. An Efficient Oblivious Transfer Protocol Using Residue Number System |
219 | -- | 230 | Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta. First-order DPA Vulnerability of Rijndael: Security and Area-delay Optimization Trade-off |