201 | -- | 210 | Jianping Zeng, Donghui Guo. Agent-based Intrusion Detection For Network-based Application |
211 | -- | 220 | Danilo Gligoroski. On a Family of Minimal Candidate One-way Functions and One-way Permutations |
221 | -- | 226 | Ali Bagherzandi, Mahmoud Salmasizadeh, Javad Mohajeri. A Related Key Attack on the Feistel Type Block Ciphers |
227 | -- | 234 | Yu Long, Zheng Gong, Kefei Chen, Shengli Liu. Provably Secure Identity-based Threshold Key Escrow from Pairing |
235 | -- | 242 | Hu Xiong, Zhiguang Qin, Fagen Li. An Anonymous Sealed-bid Electronic Auction Based on Ring Signature |
243 | -- | 252 | Somanath Tripathy, Sukumar Nandi. LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption |
253 | -- | 265 | Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab. Policy-driven and Content-based Web Services Security Gateway |
266 | -- | 270 | Chunbo Ma, Jun Ao. Group-based Proxy Re-encryption Scheme Secure Against Chosen Ciphertext Attack |
271 | -- | 281 | Chao Gong, Kamil Saraç. Toward a Practical Packet Marking Approach for IP Traceback |
282 | -- | 292 | Abedelaziz Mohaisen, DaeHun Nyang, KyungHee Lee. Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks |
293 | -- | 300 | Danilo Gligoroski, Smile Markovski, Ljupco Kocarev. Edon-R, An Infinite Family of Cryptographic Hash Functions |