175 | -- | 187 | Abubaker Wahaballa, Hu Xiong, Fagen Li, Zhen Qin, Zhiguang Qin. Secure mobile agent-based English auction protocol using identity-based signature scheme |
188 | -- | 195 | Feng Shao, Shun Zhang, Hong Zhong, Runhua Shi, Jie Cui. Keyword search protocol with privacy preservation using ID-based proxy reencryption |
196 | -- | 203 | Ye Bi. A hybrid PSO-SVM model for network intrusion detection |
204 | -- | 212 | Gao Ren, Wang Hui, Zhang Yun. A multi-channel MAC protocol with power control in the distributed cognitive radio networks |
213 | -- | 223 | Pranav Subramaniam, Abhishek Parakh. A quantum Diffie-Hellman protocol |
224 | -- | 234 | Zesheng Chen, Chao Chen. Characterising heterogeneity in vulnerable hosts on worm propagation |
235 | -- | 241 | Pengju He, Xiaomeng Chen, Huazhi Zeng. Wireless sensor network for multi-target detection algorithm based on blind source separation |