231 | -- | 240 | Cheng-Chi Lee, Pei-Shan Chung, Min-Shiang Hwang. A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments |
241 | -- | 247 | Ramasamy Murugan, Arumugam Shanmugam. A Timer Based Acknowledgement Scheme for Node Misbehavior Detection and Isolation in MANET |
248 | -- | 255 | Samir A. Elsagheer Mohamed. Secure Position Verification Approach for Wireless Ad-hoc Networks |
256 | -- | 264 | H. K. Pathak, Manju Sanghi. Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem |
265 | -- | 273 | R. Padmavathy, Chakravarthy Bhagvati. Index Calculus Method based on Smooth Numbers of ±1 over Zp |
274 | -- | 279 | Samaneh Mashhadi. A Novel Non-repudiable Threshold Proxy Signature Scheme with Known Signers |
280 | -- | 290 | Dulal Kar, Rashad Tatum, Keith Zejdlik. MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks |
291 | -- | 297 | Chang N. Zhang, Qian Yu, Xiao Wei Liu. A Hybrid Fault Tolerant Approach for AES |
298 | -- | 306 | Jaydeb Bhaumik, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury. Rain: Reversible Addition with Increased Nonlinearity |
307 | -- | 312 | Lein Harn, Chin-Chen Chang, Hsiao-Ling Wu. An Anonymous Multi-Receiver Encryption Based on RSA |
313 | -- | 316 | Blazej Brzezniak, Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski. Attack against Ibrahim's Distributed Key Generation for RSA |
317 | -- | 320 | Hu Xiong, Jian-bin Hu, Zhong Chen. Security Flaw of an ECC-based Signcryption Scheme with Anonymity |