101 | -- | 115 | Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang. Password Authentication Schemes: Current Status and Key Issues |
116 | -- | 119 | Bin Wang, Zheng-Quan Li. A Forward-Secure User Authentication Scheme with Smart Cards |
120 | -- | 131 | Wassim Itani, Ayman I. Kayssi, Ali Chehab, Camille Gaspard. A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices |
132 | -- | 137 | Sangook Moon. A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems |
138 | -- | 143 | Tianjie Cao, Dongdai Lin, Rui Xue. Security Analysis of Some Batch Verifying Signatures from Pairings |
144 | -- | 150 | Sahadeo Padhye, Birendra Kumar Sharma. A Fast Semantically Secure Public Key Cryptosystem Based on Factoring |
151 | -- | 154 | Eun-Jun Yoon, Kee-Young Yoo. On the Security of Signature Scheme with Message Recovery and Its Application |
155 | -- | 159 | Fagen Li, Xiangjun Xin, Yupu Hu. ID-based Signcryption Scheme with (t, n) Shared Unsigncryption |
160 | -- | 171 | Hamdy S. Soliman, Mohammed Omari. Application of Synchronous Dynamic Encryption System (SDES) in Wireless Sensor Networks |
172 | -- | 190 | Mark Jyn-Huey Lim, Michael Negnevitsky, Jacky Hartnett. Personality Trait Based Simulation Model of the E-mail System |
191 | -- | 202 | Asad Amir Pirzada, Chris McDonald. Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks |