1 | -- | 10 | Ismail Amr Ismail, Mohammed Amin, Hossam Diab. A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps |
11 | -- | 16 | V. Umakanta Sastry, N. Ravi Shankar, S. Durga Bhavani. A Modified Hill Cipher Involving Interweaving and Iteration |
17 | -- | 22 | Yong Zeng, Jianfeng Ma, Sang-Jae Moon. An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing |
23 | -- | 32 | Rajendra S. Katti, Rajesh G. Kavasseri. Nonce Generation For The Digital Signature Standard |
33 | -- | 38 | Rajavelu Srinivasan, V. Vaidehi, R. Rajaraman, S. Kanagaraj, R. Chidambaram Kalimuthu, R. Dharmaraj. Secure Group Key Management Scheme for Multicast Networks |
39 | -- | 45 | Fangwei Wang, Yunkai Zhang, Jianfeng Ma. Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks |
46 | -- | 54 | Nguyen Thanh Hoa, Kensuke Naoe, Yoshiyasu Takefuji. Simplified IPSec Protocol Stack for Micro Server |
55 | -- | 57 | Kou-Min Cheng, Ting Yi Chang, Jung-Wen Lo. Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol |
58 | -- | 60 | Moon K. Chetry, W. B. Vasantha Kandaswamy. A Note On Self-Shrinking Lagged Fibonacci Generator |