121 | -- | 127 | Pin Lin, Wenling Wu, Chuankun Wu. Security Analysis of Double Length Compression Function Based on Block Cipher |
128 | -- | 137 | Brian J. Cacic, Ruizhong Wei. Improving Indirect Key Management Scheme of Access Hierarchies |
138 | -- | 148 | Pairat Thorncharoensri, Tianbing Xia, Yi Mu. How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis |
149 | -- | 154 | Xiaojian Tian, Robert W. Zhu, Duncan S. Wong. Improved Efficient Remote User Authentication Schemes |
155 | -- | 165 | Leon Pan. A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7 |
166 | -- | 178 | Mahalingam Ramkumar. Broadcast Authentication With Preferred Verifiers |
179 | -- | 186 | Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin. Distributed Cryptographic Computing on Grid |
187 | -- | 192 | Amit K. Awasthi, Sunder Lal. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings |
193 | -- | 200 | Jiguo Li, Shuhong Wang. New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key |
201 | -- | 211 | Aneta Zwierko, Zbigniew Kotulski. Integrity of mobile agents: a new approach |
212 | -- | 226 | Magdy Saeb, Meer Hamza, Ahmed El-Shikh. IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems |
227 | -- | 234 | Wei Ren. Pulsing RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks |
235 | -- | 239 | Minho Kim, Çetin Kaya Koç. Vulnerabilities in the Adachi-Aoki-Komano-Ohta Micropayment Scheme |