1 | -- | 13 | Pei-Shan Chung, Chi-Wei Liu, Min-Shiang Hwang. A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments |
14 | -- | 18 | B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, M. Gomathymeenakshi. An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image |
19 | -- | 28 | Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai. Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE |
29 | -- | 39 | Jayaprakash Kar. Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network |
40 | -- | 45 | Jian-Guo Sun, Guo-Yin Zhang, Ai-Hong Yao, Jun-Peng Wu. A Reversible Digital Watermarking Algorithm for Vector Maps |
46 | -- | 52 | Soniya Balram, M. Wilscy. User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection |
53 | -- | 57 | Navaneet Ojha, Sahadeo Padhye. Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key |
58 | -- | 64 | Yanjun Liu, Chin-Chen Chang, Shih-Chang Chang. An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem |
65 | -- | 70 | A. Prakash, Rajeswari Mukesh. A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits |
71 | -- | 77 | Yunqi Dou, Jiang Weng, Chuangui Ma. Improved Fault Attack Against Eta Pairing |
78 | -- | 80 | Debiao He, Muhammad Khurram Khan, Shuhua Wu. On the Security of a RSA-based Certificateless Signature Scheme |