241 | -- | 247 | Lin-Huang Chang, Che Lin Lo, Jui-jen Lo, Wei-Ting Liu, Chou Chen Yang. Mobility Management with Distributed AAA Architecture |
248 | -- | 253 | Rongxing Lu, Zhenfu Cao, Jun Shao. On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification |
254 | -- | 265 | Kannan Karthik, Dimitrios Hatzinakos. Decryption Key Design for Joint Fingerprinting and Decryption in the Sign Bit Plane for Multicast Content Protection |
266 | -- | 270 | Xiangxue Li, Dong Zheng, Kefei Chen. LFSR-based Signatures with Message Recovery |
271 | -- | 281 | Shameem Ahmed, Moushumi Sharmin, Sheikh Iqbal Ahamed. ETS (Efficient, Transparent, and Secured) Self-healing Service for Pervasive Computing Applications |
282 | -- | 287 | Dayin Wang, Dongdai Lin, Wenling Wu. Related-Mode Attacks on CTR Encryption Mode |
288 | -- | 291 | Willy Susilo, Hiroaki Kikuchi. Cryptanalysis of Modification to Self-Certified Group-Oriented Cryptosystem without A Combiner |
292 | -- | 305 | Zonghua Zhang, Hong Shen, Yingpeng Sang. An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection |
306 | -- | 311 | Zhensong Liao, Hai Jin, Deqing Zou, Weizhong Qiang. A Novel Approach to Hide Credentials |
312 | -- | 317 | Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak. Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings |
318 | -- | 327 | Justin Z. Zhan, Stan Matwin. Privacy-Preserving Data Mining in Electronic Surveys |
328 | -- | 339 | Ajith Abraham, Crina Grosan, Carlos MartÃn-Vide. Evolutionary Design of Intrusion Detection Programs |
340 | -- | 347 | Paolo Dal Checco, Francesco Bergadano, Davide Cavagnino, Pasquale Andrea Nesta, Michele Miraglia, Pier Luigi Zaccone. Secure Logging for Irrefutable Administration |
348 | -- | 354 | Debasis Giri, Parmeshwary Dayal Srivastava. An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies |
355 | -- | 360 | Tianjie Cao, Xianping Mao. Original Signer s Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes |