201 | -- | 203 | Cheng-Chi Lee. On Security of An Efficient Nonce-based Authentication Scheme for SIP |
204 | -- | 213 | Moon-Chuen Lee, Yijun He, Zhaole Chen. Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks |
214 | -- | 217 | Girraj Kumar Verma. A Proxy Blind Signature Scheme over Braid Groups |
218 | -- | 226 | R. Rajaram Ramasamy, M. Amutha Prabakar, M. Indra Devi, M. Suguna. Knapsack Based ECC Encryption and Decryption |
227 | -- | 232 | Chang-Kuo Yeh, Wei-Bin Lee. An Overall Cost-effective Authentication Technique for the Global Mobility Network |
233 | -- | 241 | Quoc-Cuong Le, Patrick Bellot. How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys? |
242 | -- | 246 | Haibo Tian, Xiaofeng Chen, Yong Ding. Analysis of Two Types Deniable Authentication Protocols |
247 | -- | 263 | Zhiyong Zhang, Qingqi Pei, Jianfeng Ma, Lin Yang. Security and Trust in Digital Rights Management: A Survey |
264 | -- | 284 | Manik Lal Das, Ashutosh Saxena, Deepak B. Phatak. Algorithms and Approaches of Proxy Signature: A Survey |
285 | -- | 289 | Jorge Nakahara Jr.. Analysis of Venkaiah et al. s AES Design |
290 | -- | 300 | Mohammad Reza Ahmadi. An Intrusion Prediction Technique Based on Co-evolutionary Immune System for Network Security (CoCo-IDP) |