1305 | -- | 1320 | Claus-Peter Schnorr. Enhancing the security of perfect blind DL-signatures |
1321 | -- | 1337 | Enrico Nardelli, Guido Proietti. Efficient unbalanced merge-sort |
1338 | -- | 1349 | Hui-Feng Huang, Chin-Chen Chang. A novel efficient (::::t::::, ::::n::::) threshold proxy signature scheme |
1350 | -- | 1378 | Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia. A fragile watermarking scheme for detecting malicious modifications of database relations |
1379 | -- | 1394 | Wai-Tak Wong, Frank Y. Shih, Te-Feng Su. Thinning algorithms based on quadtree and octree representations |
1395 | -- | 1416 | Bruno Apolloni, Simone Bassis, Sabrina Gaito, Dario Malchiodi, Italo Zoppis. Controlling the losing probability in a monotone game |
1417 | -- | 1434 | Gopal Lakhani. Reducing coding redundancy in LZW |
1435 | -- | 1449 | Yair Neuman. A theory of meaning |
1450 | -- | 1462 | Bilâl Altay, Feyzi Basar, Mohammad Mursaleen. On the Euler sequence spaces which include the spaces ::::l::::::::::p:::::: and ::::l::::::infinity:: I |