237 | -- | 243 | Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu. A Simple Password Authentication Scheme Based on Geometric Hashing Function |
244 | -- | 251 | Zhiguang Qin, Hu Xiong, Fagen Li. A Provably Secure Certificate Based Ring Signature Without Pairing |
249 | -- | 255 | Y. V. Subba Rao, Chakravarthy Bhagvati. CRT Based Threshold Multi Secret Sharing Scheme |
252 | -- | 260 | Keying Li, Hua Ma. Outsourcing Decryption of Multi-Authority ABE Ciphertexts |
256 | -- | 264 | Yanli Ren, Zhihua Niu, Xinpeng Zhang. Fully Anonymous Identity-based Broadcast Encryption without Random Oracles |
261 | -- | 269 | Shengke Zeng, Hu Xiong. Privacy-enhanced Designated Confirmer Signature without Random Oracles |
265 | -- | 270 | Mohamed Amin, Hatem M. Abdullkader, Hani M. Ibrahem, Ahmed S. Sakr. A Steganographic Method Based on DCT, New Quantization Technique |
270 | -- | 272 | Miaomiao Tian, Youwen Zhu, Zhili Chen. Two Simple Attacks on a Blind Signature Scheme |
271 | -- | 277 | Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu 0001. A Simple Password Authentication Scheme Based on Geometric Hashing Function |
273 | -- | 276 | Chi-hsien Lin, K. Bharanitharan, Chin-Chen Chang. Comments and Proofs to Published Paper - A Novel Reversible Robust Watermarking Algorithm Based on a Chaotic System |
277 | -- | 280 | Qingfeng Cheng. Cryptanalysis of a New Efficient Authenticated Multiple-Key Exchange Protocol from Bilinear Pairings |
281 | -- | 284 | Debiao He, Yuanyuan Zhang, Jianhua Chen. Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol |
285 | -- | 288 | Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang. Comments on FHH Anonymous Multireceiver Encryption |
289 | -- | 303 | Safwan Mahmud Khan, Kevin W. Hamlen. Penny: Secure, Decentralized Data Management |
304 | -- | 312 | Qian Mao, Chin-Chen Chang, Ting-Feng Chung. A Reversible Steganography Suitable for Embedding Small Amounts of Data |
304 | -- | 312 | Boris Mihajlov, Mitko Bogdanoski. Analysis of the WSN MAC Protocols under Jamming DoS Attack |
313 | -- | 320 | Jianhong Zhang, Min Xu, Liying Liu. On the Security of a Secure Batch Verification with Group Testing for VANET |
313 | -- | 317 | Chi-Shiang Chan, Yi-Hui Chen, Yuan-Yu Tsai. An Improvement of Square Matrix Encoding by Adjusting Digits in a Matrix |
318 | -- | 321 | Tung-Huang Feng, Chung-Huei Ling, Min-Shiang Hwang. Cryptanalysis of Tan's Improvement on a Password Authentication Scheme for Multi-server Environments |
321 | -- | 332 | Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang. Robust Two-Factor Authentication and Key Agreement Preserving User Privacy |
333 | -- | 339 | Walid Khedr. On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags |
340 | -- | 350 | Yesem Kurt Peker. A New Key Agreement Scheme Based on the Triple Decomposition Problem |
351 | -- | 357 | Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Guangjun Liu. Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data |
358 | -- | 365 | Yongtao Wang. Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model |
366 | -- | 376 | mamta juneja, Parvinder Singh Sandhu. Improved LSB based Steganography Techniques for Color Images in Spatial Domain |
377 | -- | 384 | Chien-Cheng Huang, Kwo-Jean Farn, Frank Yeong-Sung Lin. A Study on Implementations of Information Security Risk Assessment: Application to Chlorine Processing System of Water Treatment |
385 | -- | 389 | Hui-Feng Huang, Hong-Wei Chang, Po-Kai Yu. Enhancement of Timestamp-based User Authentication Scheme with Smart Card |