257 | -- | 271 | Sotirios Pirounias, Dimitrios Mermigas, Constantinos Patsakis. The relation between information security events and firm market value, empirical evidence on recent disclosures: An extension of the GLZ study |
272 | -- | 281 | S. K. Ghosal, J. K. Mandal. Binomial transform based fragile watermarking for image authentication |
282 | -- | 294 | Marimuthu Karuppiah, R. Saravanan. A secure remote user mutual authentication scheme using smart cards |
295 | -- | 300 | Partha Sarathi Roy, Avishek Adhikari. One-sided leakage-resilient privacy only two-message oblivious transfer |
301 | -- | 307 | Mohamed S. Kheir, Heinz Kreft, Iris Hölken, Reinhard H. Knöchel. On the physical robustness of RF on-chip nanostructured security |
308 | -- | 320 | Chen Sun, Yang Wang, Jun Zheng. Dissecting pattern unlock: The effect of pattern strength meter on pattern selection |