241 | -- | 245 | Min-Ho Kim, Çetin Kaya Koç. Improving the Novikov and Kiselev User Authentication Scheme |
246 | -- | 254 | Rui Jiang, Aiqun Hu, Jianhua Li. Formal Protocol Design of ESIKE Based on Authentication Tests |
258 | -- | 264 | Pei-Yih Ting, Xiao-Wei Huang. Distributed Paillier Plaintext Equivalence Test |
265 | -- | 269 | Tony Thomas, Arbind K. Lal. A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting |
270 | -- | 281 | Depeng Li, Srinivas Sampalli. A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying |
282 | -- | 284 | Manik Lal Das. Comments on Improved Efficient Remote User Authentication Schemes |
285 | -- | 290 | Wei-Bin Lee, Chang-Kuo Yeh. A Self-Concealing Mechanism for Authentication of Portable Communication Systems |
291 | -- | 300 | Jing Li, Po Zhang, Srinivas Sampalli. Improved Security Mechanism for Mobile IPv6 |
301 | -- | 308 | Zaiqiang Liu, Dongdai Lin, Fengdeng Guo. A Method for Locating Digital Evidences with Outlier Detection Using Support Vector Machine |
309 | -- | 320 | Chin-Tser Huang, Sachin Thareja, Yong-June Shin. Wavelet-based Real Time Detection of Network Traffic Anomalies |
321 | -- | 330 | Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu. An Effective Anomaly Detection Method in SMTP Traffic |
331 | -- | 341 | Men Long, Chwan-Hwa Wu, J. David Irwin. Reducing Communication Overhead for Wireless Roaming Authentication: Methods and Performance Evaluation |
342 | -- | 353 | N. Nalini, G. Raghavendra Rao. Cryptanalysis of Block Ciphers via Improved Particle Swarm Optimisation and Extended Simulated Annealing Techniques |
354 | -- | 360 | Ali Bagherzandi, Javad Mohajeri, Mahmoud Salmasizadeh. Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability |