161 | -- | 174 | Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, Balasubramaniam Srinivasan. Dynamic Key Cryptography and Applications |
185 | -- | 187 | Moon K. Chetry, W. B. Vasantha Kandaswamy. A Note On Self-Shrinking Lagged Fibonacci Generator |
188 | -- | 193 | Yong Zeng, Jianfeng Ma, Sang-Jae Moon. An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing |
194 | -- | 200 | Benamar Kadri, Mohammed Feham, Abdallah M hamed. Lightweight PKI for WSN uPKI |
201 | -- | 204 | Loránd Szöllösi, Tamás Marosits, Gábor Fehér. Accelerating RSA Encryption Using Random Precalculations |
205 | -- | 209 | R. Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, R. Dharmaraj. Secure Group Key Management Scheme for Multicast Networks |
210 | -- | 215 | V. Umakanta Sastry, N. Ravi Shankar, S. Durga Bhavani. A Modified Hill Cipher Involving Interweaving and Iteration |
216 | -- | 222 | Diaa Salama Abd Elminaam, Hatem Mohamed Abdual-Kader, Mohiy Mohamed Hadhoud. Evaluating The Performance of Symmetric Encryption Algorithms |