1 | -- | 6 | Cheng-Chi Lee, Shih-Ting Chiu, Chun-Ta Li. Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol |
7 | -- | 22 | Hoseb Dermanilian, Farah Saab, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab. Energy-Efficient Security for Voice over IP |
23 | -- | 28 | Changlu Lin, Yong Li 0002, Kewei Lv, Chin-Chen Chang. Ciphertext-Auditable Identity-Based Encryption |
29 | -- | 33 | Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang. Notes on Proxy Signcryption and Multi-proxy Signature Schemes |
34 | -- | 39 | Mikio Fujiwara, Tomoyasu Domeki, Shiho Moriai, Masahide Sasaki. Highly Secure Network Switches with Quantum Key Distribution Systems |
40 | -- | 48 | Hui-Feng Huang, Pin-Han Lin, Min-Hsuan Tsai. Convertible Multi-authenticated Encryption Scheme for Data Communication |
49 | -- | 56 | Nashrul Hakiem, Mohammad Umar Siddiqi, Hashum Mohamed Rafiq. Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network |
57 | -- | 65 | Amitava Nag, Sushanta Biswas, Debasree Sarkar, Partha Pratim Sarkar. Semi Random Position Based Steganography for Resisting Statistical Steganalysis |
66 | -- | 71 | Hasmukh Patel, Devesh C. Jinwala. Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks |
72 | -- | 78 | Felipe dos Anjos Lima, Edward David Moreno, Dellano Oliveira D. dos Santos, Wanderson Roger Azevedo Dias. Energy Characterization of a Security Module in ARM Processor |
79 | -- | 84 | Yuan-Yu Tsai, Wen-Ching Huang, Bo-Feng Peng. An Efficient and Distortion-controllable Information Hiding Algorithm for 3D Polygonal Models with Adaptation |
85 | -- | 93 | Boqing Xu, Qun Xiao, Zhenxing Qian, Chuan Qin. Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes |
94 | -- | 102 | Yongtao Wang, Xiaonan Liu, Lulu Liang, Weiduan Feng, Guang Yang. Mitigating Key Escrow in Attribute-Based Encryption |