411 | -- | 419 | Min-Yu Chen, Chou Chen Yang, Min-Shiang Hwang. Privacy Protection Data Access Control |
420 | -- | 436 | Günther Lackner. A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX |
437 | -- | 445 | Naila Shakeel, Ghulam Murtaza, Nassar Ikram. MAYHAM - A New Hash Function |
446 | -- | 454 | Hongbin Tang, Xinsong Liu, Lei Jiang. A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance |
455 | -- | 464 | Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing. Cryptosystem for Secret Sharing Scheme with Hierarchical Groups |
465 | -- | 470 | Monjur Alam, Sonai Ray. Design of an Intelligent SHA-1 Based Cryptographic System: A CPSO Based Approach |
471 | -- | 477 | Chin-Chen Chang, Jen-Ho Yang. A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies |
478 | -- | 483 | Manjot Bhatia, Sunil Kumar Muttoo, M. P. S. Bhatia. Secure Requirement Prioritized Grid Scheduling Model |
484 | -- | 489 | Huiyan Chen, Yong Li 0002, Jinping Ren. A Practical Identity-based Signcryption Scheme |
490 | -- | 500 | Neeraj Kumar, Manoj Kumar, R. B. Patel. A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks |