201 | -- | 205 | Cheng-Yi Tsai, Pi-Fang Ho, Min-Shiang Hwang. A Secure Group Signature Scheme |
206 | -- | 216 | Yi-Bo Huang, Qiu-yu Zhang, Wen-Jin Hu. Robust Speech Perception Hashing Authentication Algorithm Based on Spectral Subtraction and Multi-feature Tensor |
217 | -- | 224 | Naresh Babu Muthu Mohan, Ardhani Sathya Narayana Chakravarthy, Cherukuri Ravindranath. Cryptanalysis of Design and Analysis of a Provably Secure Multi-server Authentication Scheme |
225 | -- | 234 | Debasish Das, Dhruba Kumar Bhattacharyya. Defeating Cyber Attacks Due to Script Injection |
235 | -- | 242 | Chunlin Jiang, Shi-lan Wu, Ke Gu. New Kind of Delegation-based Anonymous Authentication Scheme for Wireless Roaming Networks |
243 | -- | 255 | Kakali Chatterjee, Lalita Priya. HKDS: A Hierarchical Key Distribution Scheme for Wireless Ad Hoc Network |
256 | -- | 265 | Septafiansyah Dwi Putra, Ma'muri, Sarwono Sutikno, Yusuf Kurniawan, Adang Suwandi Ahmad. Design of an AES Device as Device Under Test in a DPA Attack |
266 | -- | 277 | Sujuan Li, Yi Mu, Mingwu Zhang. Certificate-based Smooth Projective Hashing and Its Applications |
278 | -- | 290 | Tzu-Chun Lin. A Study of Non-Abelian Public Key |
291 | -- | 303 | Shilpa Deshpande, Rajesh Ingle. Evidence Based Trust Estimation Model for Cloud Computing Services |
304 | -- | 312 | Sujatha Sivabalan, P. J. Radcliffe. Power Efficient Secure Web Servers |
313 | -- | 322 | Hongfeng Zhu, Rui Wang. A Survey to Design Privacy Preserving Protocol Using Chaos Cryptography |
323 | -- | 331 | Cheng Guo, Chin-Chen Chang, Shih-Chang Chang. A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications |
332 | -- | 336 | Jie Fang, Chenglian Liu. A Generalize Estimating the Ø(n) of Upper-Lower Bound to RSA Public Key Crytosystem |
337 | -- | 344 | Celia Li, Helen Cheung, Cungang Yang. Secure and Efficient Authentication Protocol for Power System Computer Networks |
345 | -- | 358 | Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang. Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model |
359 | -- | 370 | Rui-Hong Dong, Dong-Fang Wu, Qiu-yu Zhang, Tao Zhang. Traffic Characteristic Map-based Intrusion Detection Model for Industrial Internet |
371 | -- | 380 | Mohamed Rasslan, Ghada F. El-Kabbany, Heba Kamal Aslan. New Generic Design to Expedite Asymmetric Cryptosystems Using Three-levels of Parallelism |
381 | -- | 389 | P. Kavitha, Rajeswari Mukesh. Detection of Impersonation Attack in MANET Using Polynomial Reduction Algorithm |
390 | -- | 395 | Xueqin Zhang, Baoping Wang, Wei Wang. A New Remote Authentication Scheme for Anonymous Users Using Elliptic Curves Cryptosystem |
396 | -- | 402 | Shin Yan Chiou, Wen-Tsai Ko, Erl-Huei Lu. A Secure ECC-based Mobile RFID Mutual Authentication Protocol and Its Application |