1 | -- | 5 | Chunxiang Xu, Junhui Zhou, Guozhen Xiao. General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security |
6 | -- | 14 | Francesco Palmieri. Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace |
15 | -- | 25 | Qingyu Zhang, Kenneth L. Calvert. A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast |
26 | -- | 32 | Yijuan Shi, Jianhua Li, Jianjun Shi. Constructing Efficient Certificateless Public Key Encryption with Pairing |
33 | -- | 39 | Yu Yu, Jussipekka Leiwo, Benjamin Premkumar. A Study on the Security of Privacy Homomorphism |
40 | -- | 52 | Hwa Young Um, Edward J. Delp. A Secure Group Key Management Scheme for Wireless Cellular Systems |
53 | -- | 59 | Marko Hassinen, Maija Marttila-Kontio, Mikko Saesmaa, Heli Tervo. Secure Two-Way Transfer of Measurement Data |
60 | -- | 66 | Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh. Baseline Profile Stability for Network Anomaly Detection |
67 | -- | 79 | Mohamed Salah Bouassida, Isabelle Chrisment, Olivier Festor. Group Key Management in MANETs |
80 | -- | 81 | Michal Sramka. Cryptanalysis of the Cryptosystem Based on DLP gamma = alpha:::a:::beta:::b::: |
82 | -- | 93 | Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. Short Designated Verifier Signature Scheme and Its Identity-based Variant |
94 | -- | 102 | Nithin Nagaraj, Vivek Vaidya, Prabhakar G. Vaidya. Re-visiting the One-Time Pad |
103 | -- | 115 | Tarek S. Sobh, Ashraf Elgohary, Mohammed Zaki. Performance Improvements on the Network Level Security Protocols |
116 | -- | 120 | Da-Zhi Sun, Zhen-Fu Cao. New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme |