321 | -- | 330 | Cheng-Chi Lee, Shih-Ting Hsu, Min-Shiang Hwang. A Study of Conjunctive Keyword Searchable Schemes |
331 | -- | 340 | B. Sathish Babu, Jayashree N., Pallapa Venkataram. Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks |
341 | -- | 349 | Dhruti Sharma, Devesh Jinwala. Key Generation Protocol in IBC |
350 | -- | 356 | Debiao He, Weijing Zhao, Shuhua Wu. Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards |
357 | -- | 364 | Jayaprakash Kar. ID-based Deniable Authentication Protocol based on Diffie-Hellman Problem on Elliptic Curve |
365 | -- | 372 | P. D. Sheba Kezia Malarchelvi. A Semi-Fragile Image Content Authentication Technique based on Secure Hash in Frequency Domain |
373 | -- | 383 | Radhika Goel, Anjali Sardana, Ramesh C. Joshi. Wireless Honeypot: Framework, Architectures and Tools |
384 | -- | 389 | Haibo Tian, Xiaofeng Chen 0001, Baodian Wei, Yi Liu. Security Analysis of a Suite of Deniable Authentication Protocols |
390 | -- | 396 | M. Uma, G. Padmavathi. A Survey on Various Cyber Attacks and their Classification |
397 | -- | 404 | Christos K. Dimitriadis. Security for Mobile Operators in Practice |
405 | -- | 410 | Jung-San Lee, Chin-Chen Chang, Kuo-Jui Wei. Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy |