0 | -- | 0 | Josef Pieprzyk, Xian-Mo Zhang. Multisecret Sharing Immune Against Cheating |
0 | -- | 0 | Hongjun Wu, Feng Bao, Robert H. Deng. Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes |
0 | -- | 0 | Valery I. Korzhik, Guillermo Morales-Luna, Dmitry Marakov, Irina Marakova. Digital Semipublic Watermarking |
0 | -- | 0 | Yong Li, Bo Yang, Xiang Hua. An Efficient Anonymous Fingerprinting Scheme |
0 | -- | 0 | Yi Mu, Vijay Varadharajan. Group Cryptography: Signature and Encryption |
0 | -- | 0 | Baodian Wei, Dongsu Liu, Xinmei Wang. Analysis of AES S-box with Walsh Spectrum |
0 | -- | 0 | Adel Taweel, Pearl Brereton. Developing Software Across Time Zones: An Exploratory Empirical Study |
0 | -- | 0 | David Taniar, Yi Jiang, Kevin H. Liu, Clement H. C. Leung. Parallel Aggregate-Join Query Processing |
0 | -- | 0 | Daniele Frigioni, Laura Tarantino, Tania Di Mascio. On Formal Aspects of Zooming in Geographic Maps |
0 | -- | 0 | Tomaz Erjavec. Compiling and Using the IJS-ELAN Parallel Corpus |
0 | -- | 0 | Chunyan Bai, Roberta Houston, Gui Liang Feng. Practical Construction for Multicast Re-keying Schemes Using R-S Code and A-G Code |
0 | -- | 0 | Changjie Wang, YuMin Wang, Fangguo Zhang. An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet |