125 | -- | 129 | Minghui Jiang. A new approximation algorithm for labeling points with circle pairs |
130 | -- | 134 | Raphael Yuster. Finding and counting cliques and independent sets in r-uniform hypergraphs |
135 | -- | 138 | Chik-How Tan. Analysis of improved signcryption scheme with key privacy |
139 | -- | 144 | Guangjun Xu, Liying Kang, Erfang Shan. Acyclic domination on bipartite permutation graphs |
145 | -- | 148 | Boaz Tsaban. Fast generators for the Diffie-Hellman key agreement protocol and malicious standards |
149 | -- | 153 | Wei Huang, Yaoyun Shi, Shengyu Zhang, Yufan Zhu. The communication complexity of the Hamming distance problem |
154 | -- | 157 | Marten van Dijk, Tom A. M. Kevenaar, Geert Jan Schrijen, Pim Tuyls. Improved constructions of secret sharing schemes by applying (lambda, omega)-decompositions |
158 | -- | 162 | Olivier Danvy, Henning Korsholm Rohde. On obtaining the Boyer-Moore string-matching algorithm by partial evaluation |
163 | -- | 170 | Satoshi Ikeda, Koji Nakazawa. Strong normalization proofs by CPS-translations |