121 | -- | 129 | Hussein Al-Bahadili, Shakir M. Hussain, Ghassan Issa, Khaled El-Zayyat. Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs |
130 | -- | 136 | Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi. Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings |
137 | -- | 150 | S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari Bhat. Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points |
159 | -- | 170 | Eman El-Emam, Magdy Koutb, Hamdy M. Kelash, Osama S. Faragallah. An Authentication Protocol Based on Kerberos 5 |
171 | -- | 177 | Fuw-Yi Yang, Cai-Ming Liao. An Anonymous Auction Protocol Based on GDH Assumption |
178 | -- | 180 | Shiang-Feng Tzeng, Cheng-Chi Lee, Tzu-Chun Lin. A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy |